Finding SHA-1 Characteristics: General Results and Applications
Top Cited Papers
- 1 January 2006
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 14 references indexed in Scilit:
- Provably Good Codes for Hash Function DesignLecture Notes in Computer Science, 2007
- Herding Hash Functions and the Nostradamus AttackLecture Notes in Computer Science, 2006
- A Study of the MD5 Attacks: Insights and ImprovementsLecture Notes in Computer Science, 2006
- Searching for Differential Paths in MD4Lecture Notes in Computer Science, 2006
- Collisions of SHA-0 and Reduced SHA-1Lecture Notes in Computer Science, 2005
- Cryptanalysis of the Hash Functions MD4 and RIPEMDLecture Notes in Computer Science, 2005
- Exploiting Coding Theory for Collision Attacks on SHA-1Lecture Notes in Computer Science, 2005
- Update on SHA-1Lecture Notes in Computer Science, 2005
- Near-Collisions of SHA-0Lecture Notes in Computer Science, 2004
- Differential collisions in SHA-0Published by Springer Science and Business Media LLC ,1998