Sciweavers

4 search results - page 1 / 1
» Preimages for Reduced SHA-0 and SHA-1
Sort
View
118
Voted
CRYPTO
2008
Springer
95views Cryptology» more  CRYPTO 2008»
15 years 3 months ago
Preimages for Reduced SHA-0 and SHA-1
In this paper, we examine the resistance of the popular hash function SHA-1 and its predecessor SHA-0 against dedicated preimage attacks. In order to assess the security margin of ...
Christophe De Cannière, Christian Rechberge...
74
Voted
CRYPTO
2009
Springer
101views Cryptology» more  CRYPTO 2009»
15 years 8 months ago
Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
Kazumaro Aoki, Yu Sasaki
87
Voted
EUROCRYPT
2005
Springer
15 years 7 months ago
Collisions of SHA-0 and Reduced SHA-1
In this paper we describe improvements to the techniques used to cryptanalyze SHA-0 and introduce the first results on SHA
Eli Biham, Rafi Chen, Antoine Joux, Patrick Carrib...
ACISP
2010
Springer
14 years 11 months ago
Second-Preimage Analysis of Reduced SHA-1
Many applications using cryptographic hash functions do not require collision resistance, but some kind of preimage resistance. That's also the reason why the widely used SHA-...
Christian Rechberger