Analysis of Step-Reduced SHA-256
From MaRDI portal
Publication:3618648
DOI10.1007/11799313_9zbMath1234.94056OpenAlexW1526045302MaRDI QIDQ3618648
Norbert Pramstaller, Christian Rechberger, Florian Mendel, Vincent Rijmen
Publication date: 2 April 2009
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11799313_9
Related Items (13)
Quantum collision attacks on reduced SHA-256 and SHA-512 ⋮ Boomerang Attack on Step-Reduced SHA-512 ⋮ Attacking Reduced Round SHA-256 ⋮ Non-linear Reduced Round Attacks against SHA-2 Hash Family ⋮ Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family ⋮ Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512 ⋮ MJH: A Faster Alternative to MDC-2 ⋮ Rotational rebound attacks on reduced Skein ⋮ Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256 ⋮ Collisions and Other Non-random Properties for Step-Reduced SHA-256 ⋮ A combinatorial analysis of recent attacks on step reduced SHA-2 family ⋮ Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256 ⋮ New Collision Attacks against Up to 24-Step SHA-2
This page was built for publication: Analysis of Step-Reduced SHA-256