A combinatorial analysis of recent attacks on step reduced SHA-2 family
Citations
25 citations
7 citations
Cites background from "A combinatorial analysis of recent ..."
...The idea of feed-forward is taken further by introducing the idea of feed-forward across message blocks leading to resistance against generic multi-collision attacks....
[...]
2 citations
References
1,600 citations
"A combinatorial analysis of recent ..." refers background in this paper
...The NIST standard SHA-1 family was theoretically cryptanalysed in [24] (though, till date, a colliding message pair for SHA-1 remains to be found)....
[...]
...Following the works in [24, 25], there have been attacks [9, 22] on MD5 with improved time complexities and/or providing collisions of structured messages....
[...]
1,583 citations
"A combinatorial analysis of recent ..." refers background or methods in this paper
...Having determined W[25, 18] we next determine W[29, 26] using positions 22 to 19 of Fig....
[...]
...Define X = (D 19) + (W[25, 18] 1) + c0 and Y = (W[14, 0] 5) ⊕ (W[25, 18] 4)....
[...]
...This was followed by partial attacks on MD5 with full cryptanalysis of MD5 and other hash functions coming recently [23, 25]....
[...]
...Following the works in [24, 25], there have been attacks [9, 22] on MD5 with improved time complexities and/or providing collisions of structured messages....
[...]
1,284 citations
"A combinatorial analysis of recent ..." refers methods in this paper
...The most famous families of CRHFs are the SHA-families standardized by NIST [21] of USA and are based on the iterative Merkle-Damgård (MD) [3, 12] type of hash functions designed by Rivest....
[...]
1,001 citations
"A combinatorial analysis of recent ..." refers methods in this paper
...The most famous families of CRHFs are the SHA-families standardized by NIST [21] of USA and are based on the iterative Merkle-Damgård (MD) [3, 12] type of hash functions designed by Rivest....
[...]