×

Classification of disturbance vectors for collision attack in SHA-1. (English) Zbl 1497.94116

MSC:

94A60 Cryptography
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] Biham E, Chen R, Joux A, et al. Collisions of SHA-0 and reduced SHA-1. Lect Notes Comput Sci, 2005, 3494: 36-57 · Zbl 1137.94337 · doi:10.1007/11426639_3
[2] Wang, X. Y.; Yin, Y. L.; Yu, H., Efficient collision search attacks on SHA-0, 1-16 (2005)
[3] Wang X Y, Yin Y L, Yu H. Finding collisions in the full SHA-1. Lect Notes Comput Sci, 2005, 3621: 17-36 · Zbl 1145.94454 · doi:10.1007/11535218_2
[4] Wang, X. Y.; Yin, Y. L.; Yu, H., Cryptanalysis on SHA-1 (2005)
[5] Joux A, Peyrin T. Hash functions and the (amplified) boomerang attack. Lect Notes Comput Sci, 2007, 4622: 244-263 · Zbl 1215.94056 · doi:10.1007/978-3-540-74143-5_14
[6] Matusiewicz K, Pieprzyk J. Finding good differential patterns for attacks on SHA-1. Lect Notes Comput Sci, 2005, 3969: 164-177 · Zbl 1151.94545 · doi:10.1007/11779360_14
[7] Pramstaller N, Rechberger C, Rijmen V. Exploiting coding theory for collision attacks on SHA-1. Lect Notes Comput Sci, 2005, 3796: 78-95 · Zbl 1122.94042 · doi:10.1007/11586821_7
[8] Rijmen V, Oswald E. Update on SHA-1. Lect Notes Comput Sci, 2005, 3376: 58-71 · Zbl 1079.94571 · doi:10.1007/978-3-540-30574-3_6
[9] Yajima, J.; Iwasaki, T.; Naito, Y.; etal., A strict evaluation method on the number of conditions for the SHA-1 collision search, 10-20 (2008)
[10] Manuel S. Classification and generation of disturbance vectors for collision attacks against SHA-1. Designs Codes Cryptogr, 2011, 59: 247-263 · Zbl 1215.94061 · doi:10.1007/s10623-010-9458-9
[11] Sugita M, Kawazoe M, Perret L, et al. Algebraic cryptanalysis of 58-round SHA-1. Lect Notes Comput Sci, 2007, 4593: 349-365 · Zbl 1186.94472 · doi:10.1007/978-3-540-74619-5_22
[12] de Cannière C, Rechberger C. Finding SHA-1 characteristics: general results and applications. Lect Notes Comput Sci, 2006, 4284: 1-20 · Zbl 1172.94572 · doi:10.1007/11935230_1
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.