Finding SHA-1 Characteristics: General Results and Applications

From MaRDI portal
Publication:5459066

DOI10.1007/11935230_1zbMath1172.94572OpenAlexW124034723MaRDI QIDQ5459066

Christophe De Cannière, Christian Rechberger

Publication date: 24 April 2008

Published in: Advances in Cryptology – ASIACRYPT 2006 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11935230_1




Related Items (36)

Efficient implementation of SHA-3 hash function on 8-bit AVR-based sensor nodesClassification of disturbance vectors for collision attack in SHA-1Practical Free-Start Collision Attacks on 76-step SHA-1Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMDNew second-preimage attacks on hash functionsCryptanalysis of full \texttt{RIPEMD-128}Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160Improved Top-Down Techniques in Differential CryptanalysisCryptanalysis of GrindahlAnalysis of RIPEMD-160: new collision attacks and finding characteristics with MILPEnhancing differential-neural cryptanalysisCollisions for Round-Reduced LAKEDifferential cryptanalysis in the fixed-key modelClassification and generation of disturbance vectors for collision attacks against SHA-1The Hash Function Family LAKEA (Second) Preimage Attack on the GOST Hash FunctionInternal differential collision attacks on the reduced-round Grøstl-0 hash functionCollisions for RC4-HashMulti-collision Attack on the Compression Functions of MD4 and 3-Pass HAVALColliding Message Pair for 53-Step HAS-160Weaknesses in the HAS-V Compression FunctionMILP-Based Automatic Search Algorithms for Differential and Linear Trails for SpeckLinear Analysis of Reduced-Round CubeHashCollisions of MMO-MD5 and Their Impact on Original MD5Cryptanalysis of SHA-0 and reduced SHA-1Cryptanalysis of the GOST Hash FunctionAnalysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSACollisions for 70-Step SHA-1: On the Full Cost of Collision SearchForgery Attacks on Round-Reduced ICEPOLE-128Speeding up Collision Search for Byte-Oriented Hash FunctionsThe Differential Analysis of S-FunctionsOptimal Covering Codes for Finding Near-CollisionsDeterministic Differential Properties of the Compression Function of BMWEfficient Hash Collision Search Strategies on Special-Purpose HardwareAutomatic verification of differential characteristics: application to reduced GimliThe rebound attack and subspace distinguishers: application to Whirlpool




This page was built for publication: Finding SHA-1 Characteristics: General Results and Applications