Amanote Research

Amanote Research

    RegisterSign In

Finding Collisions in the Full SHA-1

Lecture Notes in Computer Science - Germany
doi 10.1007/11535218_2
Full Text
Open PDF
Abstract

Available in full text

Categories
Computer ScienceTheoretical Computer Science
Date

January 1, 2005

Authors
Xiaoyun WangYiqun Lisa YinHongbo Yu
Publisher

Springer Berlin Heidelberg


Related search

The First Collision for Full SHA-1

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2017English

Second-Order Differential Collisions for Reduced SHA-256

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2011English

Preimages for Reduced SHA-0 and SHA-1

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2008English

Meet-In-The-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2009English

New Preimage Attacks Against Reduced SHA-1

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2012English

Second-Preimage Analysis of Reduced SHA-1

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2010English

Energy Comparison of AES and SHA-1 for Ubiquitous Computing

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2006English

New Collision Attacks on SHA-1 Based on Optimal Joint Local-Collision Analysis

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2013English

Table 1: Building Characteristics and Collisions.

English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy