Generic Collision Attacks on Narrow-pipe Hash Functions Faster than Birthday Paradox, Applicable to MDx, SHA-1, SHA-2, and SHA-3 Narrow-pipe Candidates
暂无分享,去创建一个
[1] Danilo Gligoroski. Narrow-pipe SHA-3 candidates differ significantly from ideal random functions defined over big domains , 2010 .
[2] Antoine Joux,et al. Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions , 2004, CRYPTO.
[3] Bruce Schneier,et al. Second Primages on n-bit Hash Functions for Much Less than 2n Work | NIST , 2005 .
[4] Danilo Gligoroski,et al. Practical consequences of the aberration of narrow-pipe hash designs from ideal random functions , 2010, IACR Cryptol. ePrint Arch..
[5] Ralph C. Merkle,et al. One Way Hash Functions and DES , 1989, CRYPTO.
[6] Ivan Damgård,et al. A Design Principle for Hash Functions , 1989, CRYPTO.
[7] Ralph C. Merkle,et al. Secrecy, authentication, and public key systems , 1979 .
[8] Bruce Schneier,et al. Second Preimages on n-bit Hash Functions for Much Less than 2n Work , 2005, IACR Cryptol. ePrint Arch..