Finding Collisions in the Full SHA-1
From MaRDI portal
Publication:5451016
Recommendations
Cited in
(only showing first 100 items - show all)- Interpreting hash function security proofs
- Collisions for RC4-Hash
- The Impact of Carries on the Complexity of Collision Attacks on SHA-1
- Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA
- Boomerang distinguishers on MD4-family: first practical results on full 5-pass HAVAL
- Comment on ``Cryptanalysis and improvement of the secure quantum sealed-bid auction with post confirmation
- Does Secure Time-Stamping Imply Collision-Free Hash Functions?
- Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n
- Producing Collisions for PANAMA
- Matrix representation of conditions for the collision attack of SHA-1 and its application to the message modification
- Integral distinguishers for reduced-round Stribog
- Experimental verification of super-Sbox analysis -- confirmation of detailed attack complexity
- Quantum algorithm to find invariant linear structure of \(MD\) hash functions
- Digital Signatures Out of Second-Preimage Resistant Hash Functions
- Cryptanalysis of the GOST Hash Function
- Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160
- The phantom of differential characteristics
- A fast pseudorandom number generator with BLAKE hash function
- Automatic search for the best trails in ARX: application to block cipher \textsc{Speck}
- New records of pre-image search of reduced SHA-1 using SAT solvers
- A secure and efficient on-line/off-line group key distribution protocol
- Attacking Reduced Round SHA-256
- Non-linear Reduced Round Attacks against SHA-2 Hash Family
- Collision resistant double-length hashing
- Quantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions
- A (Second) Preimage Attack on the GOST Hash Function
- Second order collision for the 42-step reduced DHA-256 hash function
- Multiobjective evolutionary optimization techniques based hyperchaotic map and their applications in image encryption
- Boomerang attack on step-reduced SHA-512
- Security analysis of SIMD
- Boomerang Distinguisher for the SIMD-512 Compression Function
- Triangulating rebound attack on AES-like hashing
- Analysis of message injection in stream cipher-based hash functions
- Collisions of MMO-MD5 and their impact on original MD5
- Meet-in-the-middle preimage attacks on sponge-based hashing
- Generic attacks on hash combiners
- Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256
- Optimal covering codes for finding near-collisions
- Security of Digital Signature Schemes in Weakened Random Oracle Models
- Information Security and Cryptology - ICISC 2005
- MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes
- Weaknesses in the HAS-V Compression Function
- Automatic verification of differential characteristics: application to reduced Gimli
- Preimage attacks on 4-round Keccak by solving multivariate quadratic systems
- Cryptanalysis of SHA-0 and reduced SHA-1
- Analysis of Reduced-SHAvite-3-256 v2
- Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL
- Improving smart card security using elliptic curve cryptography over prime field \((F_{p})\)
- Practical Collisions for EnRUPT
- Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD
- Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound
- The design of keyed hash function based on CNN-MD structure
- Cryptanalysis of the Round-Reduced GOST Hash Function
- A vulnerability in implementations of SHA-3, SHAKE, EdDSA, and other NIST-approved algorithms
- Practical Analysis of Reduced-Round Keccak
- Freestart collision for full SHA-1
- New Differential-Algebraic Attacks and Reparametrization of Rainbow
- How to Build a Hash Function from Any Collision-Resistant Function
- A provably secure non-iterative hash function resisting birthday attack
- Security analysis of randomize-hash-then-sign digital signatures
- MD4 is Not One-Way
- Constructing chaos-based hash function via parallel impulse perturbation
- Efficient implementation of SHA-3 hash function on 8-bit AVR-based sensor nodes
- Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL
- A Three-Property-Secure Hash Function
- Attacks on a double length blockcipher-based hash proposal
- Compression from Collisions, or Why CRHF Combiners Have a Long Output
- Security of NMAC and HMAC Based on Non-malleability
- Herding Hash Functions and the Nostradamus Attack
- The rebound attack and subspace distinguishers: application to Whirlpool
- Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures
- Collision attack on \({\mathtt Grindahl}\)
- Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
- Speeding up Collision Search for Byte-Oriented Hash Functions
- Hash Functions from Sigma Protocols and Improvements to VSH
- A SAT-based preimage analysis of reduced \textsc{Keccak} hash functions
- Constructing keyed hash algorithm using enhanced chaotic map with varying parameter
- One-key compression function based MAC with security beyond birthday bound
- Cryptanalysis of GOST R hash function
- Multi-property Preserving Combiners for Hash Functions
- Finding SHA-2 characteristics: searching through a minefield of contradictions
- On the ring-LWE and polynomial-LWE problems
- Collisions of SHA-0 and Reduced SHA-1
- A synthetic indifferentiability analysis of some block-cipher-based hash functions
- Robust multi-property combiners for hash functions
- Rotational rebound attacks on reduced Skein
- On the impossibility of highly-efficient blockcipher-based hash functions
- On Randomizing Hash Functions to Strengthen the Security of Digital Signatures
- Hash function requirements for Schnorr signatures
- Topics in Cryptology – CT-RSA 2005
- Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC
- Survey of information security
- Partial-collision attack on the round-reduced compression function of Skein-256
- Internal differential collision attacks on the reduced-round Grøstl-0 hash function
- Advances in Cryptology – CRYPTO 2004
- A fingerprint encryption scheme based on irreversible function and secure authentication
- The Delicate Issues of Addition with Respect to XOR Differences
- New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
- The first collision for full SHA-1
- Linear-XOR and Additive Checksums Don’t Protect Damgård-Merkle Hashes from Generic Attacks
This page was built for publication: Finding Collisions in the Full SHA-1
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5451016)