Analysis of SHA-512/224 and SHA-512/256
From MaRDI portal
Publication:2795992
DOI10.1007/978-3-662-48800-3_25zbMath1382.94095OpenAlexW2294268844MaRDI QIDQ2795992
Christoph Dobraunig, Florian Mendel, Maria Eichlseder
Publication date: 23 March 2016
Published in: Advances in Cryptology – ASIACRYPT 2015 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-48800-3_25
Related Items (5)
Quantum collision attacks on reduced SHA-256 and SHA-512 ⋮ A new authentication procedure for client-server applications using HMAC ⋮ Efficient implementation of SHA-3 hash function on 8-bit AVR-based sensor nodes ⋮ Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160 ⋮ Analysis of RIPEMD-160: new collision attacks and finding characteristics with MILP
This page was built for publication: Analysis of SHA-512/224 and SHA-512/256