Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512
From MaRDI portal
Publication:3605393
DOI10.1007/978-3-642-00306-6_13zbMath1352.94045OpenAlexW1794392052MaRDI QIDQ3605393
Shouichi Hirose, Hidenori Kuwakado
Publication date: 24 February 2009
Published in: Information Security Applications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-00306-6_13
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Non-linear Reduced Round Attacks against SHA-2 Hash Family
- Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
- Analysis of Step-Reduced SHA-256
- Amplified Boomerang Attack against Reduced-Round SHACAL
- A Simple Variant of the Merkle-Damgård Scheme with a Permutation
- Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms
- Progress in Cryptology - INDOCRYPT 2003
- Related-Key Rectangle Attack on the Full SHACAL-1
- New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
- Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
- Multi-Property-Preserving Hash Domain Extension and the EMD Transform
- New Proofs for NMAC and HMAC: Security Without Collision-Resistance
This page was built for publication: Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512