Second-Order Differential Collisions for Reduced SHA-256
From MaRDI portal
Publication:3102192
DOI10.1007/978-3-642-25385-0_15zbMath1227.94031OpenAlexW63858338MaRDI QIDQ3102192
Alex Biryukov, Florian Mendel, Ivica Nikolić, Mario Lamberger
Publication date: 2 December 2011
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-25385-0_15
Related Items (11)
Quantum collision attacks on reduced SHA-256 and SHA-512 ⋮ Efficient implementation of SHA-3 hash function on 8-bit AVR-based sensor nodes ⋮ Boomerang Attack on Step-Reduced SHA-512 ⋮ The Boomerang Attacks on the Round-Reduced Skein-512 ⋮ Boomerang and Slide-Rotational Analysis of the SM3 Hash Function ⋮ A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis ⋮ Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160 ⋮ Second order collision for the 42-step reduced DHA-256 hash function ⋮ Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK ⋮ Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA ⋮ Boomerang Distinguisher for the SIMD-512 Compression Function
This page was built for publication: Second-Order Differential Collisions for Reduced SHA-256