Cryptanalysis of SHA-0 and reduced SHA-1
From MaRDI portal
Publication:2018819
DOI10.1007/s00145-014-9179-8zbMath1334.94061OpenAlexW1989313172MaRDI QIDQ2018819
Eli Biham, Rafi Chen, Antoine Joux
Publication date: 25 March 2015
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-014-9179-8
Related Items (3)
Practical-time related-key attack on GOST with secret S-boxes ⋮ Cryptanalysis of SHA-0 and reduced SHA-1 ⋮ On the inadequacy of multimodal maps for cryptographic hash applications with phase-space modulation
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A fast software one-way hash function
- Cryptanalysis of MD4
- Cryptanalysis of SHA-0 and reduced SHA-1
- Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers
- New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
- Hash Functions and the (Amplified) Boomerang Attack
- Cryptanalysis of the Full HAVAL with 4 and 5 Passes
- RIPEMD-160: A strengthened version of RIPEMD
- New Collision Attacks on SHA-1 Based on Optimal Joint Local-Collision Analysis
- Advances in Cryptology – CRYPTO 2004
- Cryptanalysis of the Hash Functions MD4 and RIPEMD
- How to Break MD5 and Other Hash Functions
- Collisions of SHA-0 and Reduced SHA-1
- Efficient Collision Search Attacks on SHA-0
- Finding Collisions in the Full SHA-1
- Collisions for 70-Step SHA-1: On the Full Cost of Collision Search
- Finding SHA-1 Characteristics: General Results and Applications
- New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers
- Topics in Cryptology – CT-RSA 2005
- One Way Hash Functions and DES
This page was built for publication: Cryptanalysis of SHA-0 and reduced SHA-1