Finding Near-Optimum Message Scheduling Settings for SHA-256 Variants Using Genetic Algorithms
暂无分享,去创建一个
[1] Xiaoyun Wang,et al. Efficient Collision Search Attacks on SHA-0 , 2005, CRYPTO.
[2] Vincent Rijmen,et al. Analysis of Step-Reduced SHA-256 , 2006, FSE.
[3] Palash Sarkar,et al. PARSHA-256- - A New Parallelizable Hash Function and a Multithreaded Implementation , 2003, FSE.
[4] Jian Guo,et al. Preimages for Step-Reduced SHA-2 , 2009, IACR Cryptol. ePrint Arch..
[5] Alex Biryukov,et al. Analysis of a SHA-256 Variant , 2005, Selected Areas in Cryptography.
[6] Bart Preneel,et al. Collisions and other Non-Random Properties for Step-Reduced SHA-256 , 2009, IACR Cryptol. ePrint Arch..
[7] Evgeny A. Grechnikov. Collisions for 72-step and 73-step SHA-1: Improvements in the Method of Characteristics , 2010, IACR Cryptol. ePrint Arch..
[8] John H. Holland,et al. Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .
[9] Helena Handschuh,et al. Security Analysis of SHA-256 and Sisters , 2003, Selected Areas in Cryptography.
[10] Xiaoyun Wang,et al. Finding Collisions in the Full SHA-1 , 2005, CRYPTO.
[11] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[12] Yi-Shiung Yeh,et al. Analyze SHA-1 in message schedule , 2007 .
[13] Vincent Rijmen,et al. Analysis of simplified variants of SHA-256 , 2005, WEWoRC.
[14] Antoine Joux,et al. Differential Collisions in SHA-0 , 1998, CRYPTO.
[15] Alex Biryukov,et al. Collisions for Step-Reduced SHA-256 , 2008, FSE.
[16] Vincent Rijmen,et al. Update on SHA-1 , 2005, CT-RSA.
[17] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[18] Quynh H. Dang,et al. Secure Hash Standard | NIST , 2015 .
[19] Jongsung Kim,et al. Related-Key Rectangle Attack on 42-Round SHACAL-2 , 2006, ISC.
[20] Florian Mendel,et al. Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions , 2011, ASIACRYPT.
[21] Palash Sarkar,et al. New Collision Attacks against Up to 24-Step SHA-2 , 2008, INDOCRYPT.
[22] Alex Biryukov,et al. Data Encryption Standard (DES) , 2005, Encyclopedia of Cryptography and Security.
[23] Alex Biryukov,et al. Second-Order Differential Collisions for Reduced SHA-256 , 2011, ASIACRYPT.