Sciweavers

CTRSA
2005
Springer
92views Cryptology» more  CTRSA 2005»
13 years 10 months ago
Update on SHA-1
Abstract. We report on the experiments we performed in order to assess the security of SHA-1 against the attack by Chabaud and Joux [5]. We present some ideas for optimizations of ...
Vincent Rijmen, Elisabeth Oswald
FSE
2007
Springer
192views Cryptology» more  FSE 2007»
13 years 11 months ago
Algebraic Cryptanalysis of 58-Round SHA-1
In 2004, a new attack against SHA-1 has been proposed by a team leaded by Wang [15]. The aim of this article5 is to sophisticate and improve Wang’s attack by using algebraic tech...
Makoto Sugita, Mitsuru Kawazoe, Ludovic Perret, Hi...