Security Considerations for the SHA-0 and SHA-1 Message-Digest Algorithms
暂无分享,去创建一个
Paul E. Hoffman | Sean Turner | Tim Polk | P. Hoffman | Tim Polk | Lily Chen | S. Turner | Lily Chen
[1] Stéphane Manuel,et al. Classification and generation of disturbance vectors for collision attacks against SHA-1 , 2011, Des. Codes Cryptogr..
[2] Antoine Joux,et al. Differential Collisions in SHA-0 , 1998, CRYPTO.
[3] Yu Sasaki,et al. Improved Collision Search for SHA-0 , 2006, ASIACRYPT.
[4] Yu Sasaki,et al. Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1 , 2009, CRYPTO.
[5] Bruce Schneier,et al. Second Preimages on n-bit Hash Functions for Much Less than 2n Work , 2005, IACR Cryptol. ePrint Arch..
[6] Scott Contini,et al. Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions , 2006, ASIACRYPT.
[7] Christophe De Cannière,et al. Preimages for Reduced SHA-0 and SHA-1 , 2008, CRYPTO.