Attacking Reduced Round SHA-256
暂无分享,去创建一个
[1] Krystian Matusiewicz,et al. Analysis of Modern Dedicated Cryptographic Hash Functions , 2007 .
[2] Alex Biryukov,et al. Collisions for Step-Reduced SHA-256 , 2008, FSE.
[3] Eli Biham,et al. Near-Collisions of SHA-0 , 2004, CRYPTO.
[4] Vincent Rijmen,et al. Analysis of simplified variants of SHA-256 , 2005, WEWoRC.
[5] Palash Sarkar,et al. New Local Collisions for the SHA-2 Hash Family , 2007, IACR Cryptol. ePrint Arch..
[6] Ivan Damgård,et al. A Design Principle for Hash Functions , 1989, CRYPTO.
[7] Alex Biryukov,et al. Analysis of a SHA-256 Variant , 2005, Selected Areas in Cryptography.
[8] Hui Chen,et al. Cryptanalysis of the Hash Functions MD4 and RIPEMD , 2005, EUROCRYPT.
[9] Antoine Joux,et al. Differential Collisions in SHA-0 , 1998, CRYPTO.
[10] Philip Hawkes,et al. On Corrective Patterns for the SHA-2 Family , 2004, IACR Cryptol. ePrint Arch..
[11] C. Moler,et al. Advances in Cryptology , 2000, Lecture Notes in Computer Science.
[12] Xiaoyun Wang,et al. Finding Collisions in the Full SHA-1 , 2005, CRYPTO.
[13] Vincent Rijmen,et al. Update on SHA-1 , 2005, CT-RSA.
[14] Jacques Stern,et al. A method for finding codewords of small weight , 1989, Coding Theory and Applications.
[15] Vincent Rijmen,et al. Analysis of Step-Reduced SHA-256 , 2006, FSE.
[16] Vincent Rijmen,et al. Exploiting Coding Theory for Collision Attacks on SHA-1 , 2005, IMACC.
[17] Anne Canteaut,et al. A New Algorithm for Finding Minimum-Weight Words in a Linear Code: Application to McEliece’s Cryptosystem and to Narrow-Sense BCH Codes of Length , 1998 .
[18] Helena Handschuh,et al. Security Analysis of SHA-256 and Sisters , 2003, Selected Areas in Cryptography.
[19] Jeffrey S. Leon,et al. A probabilistic algorithm for computing minimum weights of large error-correcting codes , 1988, IEEE Trans. Inf. Theory.
[20] Xiaoyun Wang,et al. How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.
[21] Ralph C. Merkle,et al. One Way Hash Functions and DES , 1989, CRYPTO.