Finding SHA-1 Characteristics: General Results and Applications
Top Cited Papers
- 1 January 2006
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 14 references indexed in Scilit:
- Provably Good Codes for Hash Function DesignPublished by Springer Nature ,2007
- Herding Hash Functions and the Nostradamus AttackPublished by Springer Nature ,2006
- A Study of the MD5 Attacks: Insights and ImprovementsPublished by Springer Nature ,2006
- Searching for Differential Paths in MD4Published by Springer Nature ,2006
- Collisions of SHA-0 and Reduced SHA-1Published by Springer Nature ,2005
- Cryptanalysis of the Hash Functions MD4 and RIPEMDPublished by Springer Nature ,2005
- Exploiting Coding Theory for Collision Attacks on SHA-1Published by Springer Nature ,2005
- Update on SHA-1Published by Springer Nature ,2005
- Near-Collisions of SHA-0Published by Springer Nature ,2004
- Differential collisions in SHA-0Published by Springer Nature ,1998