Finding Collisions in the Full SHA-1
From MaRDI portal
Publication:5451016
DOI10.1007/11535218_2zbMATH Open1145.94454DBLPconf/crypto/WangYY05aOpenAlexW1656731780WikidataQ30053158 ScholiaQ30053158MaRDI QIDQ5451016FDOQ5451016
Authors: Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu
Publication date: 17 March 2008
Published in: Advances in Cryptology – CRYPTO 2005 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11535218_2
Recommendations
Cited In (only showing first 100 items - show all)
- A (Second) Preimage Attack on the GOST Hash Function
- Preimage attacks on 4-round Keccak by solving multivariate quadratic systems
- Cryptanalysis of the GOST Hash Function
- Weaknesses in the HAS-V Compression Function
- Quantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions
- Optimal covering codes for finding near-collisions
- Attacking Reduced Round SHA-256
- Non-linear Reduced Round Attacks against SHA-2 Hash Family
- Second order collision for the 42-step reduced DHA-256 hash function
- Practical Collisions for EnRUPT
- The Impact of Carries on the Complexity of Collision Attacks on SHA-1
- Comment on ``Cryptanalysis and improvement of the secure quantum sealed-bid auction with post confirmation
- Boomerang Distinguisher for the SIMD-512 Compression Function
- A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators
- Cryptanalysis of SHA-0 and reduced SHA-1
- Improving smart card security using elliptic curve cryptography over prime field \((F_{p})\)
- A vulnerability in implementations of SHA-3, SHAKE, EdDSA, and other NIST-approved algorithms
- Meet-in-the-middle preimage attacks on sponge-based hashing
- Analysis of Reduced-SHAvite-3-256 v2
- Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA
- Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck
- Collisions for RC4-Hash
- Does Secure Time-Stamping Imply Collision-Free Hash Functions?
- Digital Signatures Out of Second-Preimage Resistant Hash Functions
- Cryptanalysis of the Round-Reduced GOST Hash Function
- Collision resistant double-length hashing
- Multiobjective evolutionary optimization techniques based hyperchaotic map and their applications in image encryption
- Security analysis of SIMD
- Analysis of message injection in stream cipher-based hash functions
- Collisions of MMO-MD5 and their impact on original MD5
- MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes
- Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL
- The design of keyed hash function based on CNN-MD structure
- Experimental verification of super-Sbox analysis -- confirmation of detailed attack complexity
- Triangulating rebound attack on AES-like hashing
- Automatic verification of differential characteristics: application to reduced Gimli
- Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound
- Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256
- Interpreting hash function security proofs
- Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n
- Quantum algorithm to find invariant linear structure of \(MD\) hash functions
- Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160
- Matrix representation of conditions for the collision attack of SHA-1 and its application to the message modification
- Integral distinguishers for reduced-round Stribog
- Boomerang attack on step-reduced SHA-512
- Generic attacks on hash combiners
- Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD
- A fast pseudorandom number generator with BLAKE hash function
- New records of pre-image search of reduced SHA-1 using SAT solvers
- Security of Digital Signature Schemes in Weakened Random Oracle Models
- Boomerang distinguishers on MD4-family: first practical results on full 5-pass HAVAL
- A secure and efficient on-line/off-line group key distribution protocol
- Information Security and Cryptology - ICISC 2005
- The phantom of differential characteristics
- Producing Collisions for PANAMA
- One-key compression function based MAC with security beyond birthday bound
- The rebound attack and subspace distinguishers: application to Whirlpool
- Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures
- A SAT-based preimage analysis of reduced \textsc{Keccak} hash functions
- Cryptanalysis of GOST R hash function
- How to Fill Up Merkle-Damgård Hash Functions
- A Three-Property-Secure Hash Function
- Efficient implementation of SHA-3 hash function on 8-bit AVR-based sensor nodes
- New proofs for NMAC and HMAC: security without collision resistance
- Compression from Collisions, or Why CRHF Combiners Have a Long Output
- Speeding up Collision Search for Byte-Oriented Hash Functions
- The Delicate Issues of Addition with Respect to XOR Differences
- Another step towards realizing random oracles: non-malleable point obfuscation
- On the ring-LWE and polynomial-LWE problems
- The first collision for full SHA-1
- MD4 is Not One-Way
- Practical free-start collision attacks on 76-step SHA-1
- Freestart collision for full SHA-1
- Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
- Linear-XOR and Additive Checksums Don’t Protect Damgård-Merkle Hashes from Generic Attacks
- Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL
- Survey of information security
- Cryptanalysis of Grindahl
- Hash Functions from Sigma Protocols and Improvements to VSH
- Algebraic Attacks on Round-Reduced Keccak
- A provably secure short signature scheme based on discrete logarithms
- A fingerprint encryption scheme based on irreversible function and secure authentication
- New Differential-Algebraic Attacks and Reparametrization of Rainbow
- Advances in Cryptology – CRYPTO 2004
- Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security
- Multi-property Preserving Combiners for Hash Functions
- On Free-Start Collisions and Collisions for TIB3
- Topics in Cryptology – CT-RSA 2005
- Robust multi-property combiners for hash functions
- Rotational rebound attacks on reduced Skein
- Cryptanalysis of full \texttt{RIPEMD-128}
- New second-preimage attacks on hash functions
- A structure-based chaotic hashing scheme
- Security of NMAC and HMAC Based on Non-malleability
- Collisions of SHA-0 and Reduced SHA-1
- On the impossibility of highly-efficient blockcipher-based hash functions
- Collisions for 70-Step SHA-1: On the Full Cost of Collision Search
- Efficient Collision Search Attacks on SHA-0
- Finding SHA-1 Characteristics: General Results and Applications
- Security analysis of randomize-hash-then-sign digital signatures
This page was built for publication: Finding Collisions in the Full SHA-1
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5451016)