A combinatorial analysis of recent attacks on step reduced SHA-2 family
From MaRDI portal
Publication:1032494
DOI10.1007/S12095-009-0011-5zbMath1178.94201OpenAlexW1974963949MaRDI QIDQ1032494
Palash Sarkar, Somitra Kumar Sanadhya
Publication date: 26 October 2009
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12095-009-0011-5
Cites Work
- Unnamed Item
- Cryptanalysis of MD4
- Attacking Reduced Round SHA-256
- Non-linear Reduced Round Attacks against SHA-2 Hash Family
- Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family
- Analysis of Step-Reduced SHA-256
- Collisions and Other Non-random Properties for Step-Reduced SHA-256
- Cryptanalysis of MD4
- Cryptanalysis of the Hash Functions MD4 and RIPEMD
- Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities
- New Collision Attacks against Up to 24-Step SHA-2
- Selected Areas in Cryptography
This page was built for publication: A combinatorial analysis of recent attacks on step reduced SHA-2 family