On the cost of ASIC hardware crackers: a SHA-1 case study
From MaRDI portal
Publication:826307
DOI10.1007/978-3-030-75539-3_27OpenAlexW3160754115MaRDI QIDQ826307
Anupam Chattopadhyay, Mustafa Khairallah, Zakaria Najm, Vesselin Velichkov, Thomas Peyrin, Gaëtan Leurent
Publication date: 20 December 2021
Full work available at URL: https://hal.inria.fr/hal-03529193/file/article.pdf
Cites Work
- Parallel collision search with cryptanalytic applications
- The first collision for full SHA-1
- From collisions to chosen-prefix collisions application to full SHA-1
- Freestart Collision for Full SHA-1
- The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers
- Biclique Cryptanalysis of the Full AES
- Practical Free-Start Collision Attacks on 76-step SHA-1
- Hash Functions and the (Amplified) Boomerang Attack
- Monte Carlo Methods for Index Computation (mod p)
- New Collision Attacks on SHA-1 Based on Optimal Joint Local-Collision Analysis
- Cryptanalysis with COPACOBANA