Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Yiqun Lisa Yin
Finding Collisions in the Full SHA-1
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Related publications
The First Collision for Full SHA-1
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Second-Order Differential Collisions for Reduced SHA-256
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Preimages for Reduced SHA-0 and SHA-1
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Meet-In-The-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
New Preimage Attacks Against Reduced SHA-1
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Second-Preimage Analysis of Reduced SHA-1
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Energy Comparison of AES and SHA-1 for Ubiquitous Computing
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
New Collision Attacks on SHA-1 Based on Optimal Joint Local-Collision Analysis
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Table 1: Building Characteristics and Collisions.