Sciweavers

2 search results - page 1 / 1
» Second-Preimage Analysis of Reduced SHA-1
Sort
View
89
Voted
ACISP
2010
Springer
14 years 7 months ago
Second-Preimage Analysis of Reduced SHA-1
Many applications using cryptographic hash functions do not require collision resistance, but some kind of preimage resistance. That's also the reason why the widely used SHA-...
Christian Rechberger
CRYPTO
2008
Springer
163views Cryptology» more  CRYPTO 2008»
14 years 11 months ago
Cryptanalysis of the GOST Hash Function
In this article, we analyze the security of the GOST hash function. The GOST hash function, defined in the Russian standard GOST 34.11-94, is an iterated hash function producing a ...
Florian Mendel, Norbert Pramstaller, Christian Rec...