Sciweavers

2 search results - page 1 / 1
» Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 an...
Sort
View
CRYPTO
2008
Springer
95views Cryptology» more  CRYPTO 2008»
13 years 7 months ago
Preimages for Reduced SHA-0 and SHA-1
In this paper, we examine the resistance of the popular hash function SHA-1 and its predecessor SHA-0 against dedicated preimage attacks. In order to assess the security margin of ...
Christophe De Cannière, Christian Rechberge...