Sciweavers

10 search results - page 1 / 2
» Finding Collisions in the Full SHA-1
Sort
View
CRYPTO
2005
Springer
111views Cryptology» more  CRYPTO 2005»
13 years 11 months ago
Finding Collisions in the Full SHA-1
In this paper, we present new collision search attacks on the
Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu
SACRYPT
2007
Springer
151views Cryptology» more  SACRYPT 2007»
13 years 11 months ago
Collisions for 70-Step SHA-1: On the Full Cost of Collision Search
The diversity of methods for fast collision search in SHA-1 and similar hash functions makes a comparison of them difficult. The literature is at times very vague on this issue, wh...
Christophe De Cannière, Florian Mendel, Chr...
ASIACRYPT
2006
Springer
13 years 9 months ago
Finding SHA-1 Characteristics: General Results and Applications
The most efficient collision attacks on members of the SHA family presented so far all use complex characteristics which were manually constructed by Wang et al. In this report, we...
Christophe De Cannière, Christian Rechberge...
ACISP
2007
Springer
13 years 9 months ago
A New Strategy for Finding a Differential Path of SHA-1
In this paper, we propose a new construction algorithm for finding differential paths of Round 1 of SHA-1 for use in the collision search attack. Generally, the differential path o...
Jun Yajima, Yu Sasaki, Yusuke Naito, Terutoshi Iwa...
FSE
2008
Springer
162views Cryptology» more  FSE 2008»
13 years 7 months ago
Collisions on SHA-0 in One Hour
At Crypto 2007, Joux and Peyrin showed that the boomerang attack, a classical tool in block cipher cryptanalysis, can also be very useful when analyzing hash functions. They applie...
Stéphane Manuel, Thomas Peyrin