Sciweavers

2 search results - page 1 / 1
» Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 an...
Sort
View
CRYPTO
2008
Springer
95views Cryptology» more  CRYPTO 2008»
15 years 16 days ago
Preimages for Reduced SHA-0 and SHA-1
In this paper, we examine the resistance of the popular hash function SHA-1 and its predecessor SHA-0 against dedicated preimage attacks. In order to assess the security margin of ...
Christophe De Cannière, Christian Rechberge...
62
Voted
CRYPTO
2009
Springer
101views Cryptology» more  CRYPTO 2009»
15 years 5 months ago
Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
Kazumaro Aoki, Yu Sasaki