New records in collision attacks on SHA-2
From MaRDI portal
Publication:6636388
DOI10.1007/978-3-031-58716-0_6MaRDI QIDQ6636388
Yingxin Li, Fukang Liu, Gaoli Wang
Publication date: 12 November 2024
Cites Work
- Title not available (Why is that?)
- The first collision for full SHA-1
- Automatic verification of differential characteristics: application to reduced Gimli
- From collisions to chosen-prefix collisions application to full SHA-1
- Efficient collision attack frameworks for RIPEMD-160
- Collisions and semi-free-start collisions for round-reduced RIPEMD-160
- Analysis of SHA-512/224 and SHA-512/256
- Improved Cryptanalysis of Reduced RIPEMD-160
- Branching Heuristics in Differential Collision Search with Applications to SHA-512
- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
- Second-Order Differential Collisions for Reduced SHA-256
- Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions
- Preimage Attacks on Reduced Tiger and SHA-2
- Boomerang Attack on Step-Reduced SHA-512
- Collisions for Step-Reduced SHA-256
- Analysis of Step-Reduced SHA-256
- Collisions and Other Non-random Properties for Step-Reduced SHA-256
- Preimages for Step-Reduced SHA-2
- Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128
- Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family
- Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2
- Cryptanalysis of Full RIPEMD-128
- New Collision Attacks on SHA-1 Based on Optimal Joint Local-Collision Analysis
- Improving Local Collisions: New Attacks on Reduced SHA-256
- Cryptanalysis of the Hash Functions MD4 and RIPEMD
- How to Break MD5 and Other Hash Functions
- Collisions of SHA-0 and Reduced SHA-1
- Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities
- Efficient Collision Search Attacks on SHA-0
- Finding Collisions in the Full SHA-1
- Finding SHA-1 Characteristics: General Results and Applications
- New Collision Attacks against Up to 24-Step SHA-2
- Applications of SAT Solvers to Cryptanalysis of Hash Functions
- One Way Hash Functions and DES
- Analysis of RIPEMD-160: new collision attacks and finding characteristics with MILP
This page was built for publication: New records in collision attacks on SHA-2
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6636388)