We study the security of step-reduced but otherwise unmodified SHA-256. We show the first collision attacks on SHA-256 reduced to 23 and 24 steps with complexities 2 18 and 2 28.5 , respectively. We give example colliding message pairs for 23-step and 24-step SHA-256. The best previous, recently obtained result was a collision attack for up to 22 steps. We extend our attacks to 23 and 24-step reduced SHA-512 with respective complexities of 2 44.9 and 2 53.0 . Additionally, we show non-random behaviour of the SHA-256 compression function in the form of free-start near-collisions for up to 31 steps, which is 6 more steps than the recently obtained non-random behaviour in the form of a semi-free-start near-collision. Even though this represent...
peer reviewedIn this work, we introduce a new non-random property for hash/compression functions usi...
Abstract. The main contributions of this paper are two-fold. Firstly, we present a novel direction i...
We present in this article a freestart collision example for SHA-1, i.e., a collision for its intern...
Abstract. We study the security of step-reduced but otherwise unmod-ified SHA-256. We show the first...
We study the security of step-reduced but otherwise unmodified SHA-256. We show the first collision ...
This is the first article analyzing the security of SHA-256 against fast collision search which cons...
This is the first article analyzing the security of SHA-256 against fast collision search which cons...
Abstract. In this paper, we focus on the construction of semi-free-start collisions for SHA-256, and...
International audienceIn this paper we analyze the security of the compression function of SHA-1 aga...
In this paper we analyze the security of the compression function of SHA-1 against collision attack...
Abstract. In this work, we introduce a new non-random property for hash/compression functions using ...
Abstract. In this paper we describe improvements to the techniques used to cryptanalyze SHA-0 and in...
In this paper we analyse the role of some of the building blocks of SHA-256. We show that the distur...
Abstract: In this paper we analyse the role of some of the building blocks of SHA-256. We show that ...
Abstract: In this paper we analyse the role of some of the building blocks of SHA-256. We show that ...
peer reviewedIn this work, we introduce a new non-random property for hash/compression functions usi...
Abstract. The main contributions of this paper are two-fold. Firstly, we present a novel direction i...
We present in this article a freestart collision example for SHA-1, i.e., a collision for its intern...
Abstract. We study the security of step-reduced but otherwise unmod-ified SHA-256. We show the first...
We study the security of step-reduced but otherwise unmodified SHA-256. We show the first collision ...
This is the first article analyzing the security of SHA-256 against fast collision search which cons...
This is the first article analyzing the security of SHA-256 against fast collision search which cons...
Abstract. In this paper, we focus on the construction of semi-free-start collisions for SHA-256, and...
International audienceIn this paper we analyze the security of the compression function of SHA-1 aga...
In this paper we analyze the security of the compression function of SHA-1 against collision attack...
Abstract. In this work, we introduce a new non-random property for hash/compression functions using ...
Abstract. In this paper we describe improvements to the techniques used to cryptanalyze SHA-0 and in...
In this paper we analyse the role of some of the building blocks of SHA-256. We show that the distur...
Abstract: In this paper we analyse the role of some of the building blocks of SHA-256. We show that ...
Abstract: In this paper we analyse the role of some of the building blocks of SHA-256. We show that ...
peer reviewedIn this work, we introduce a new non-random property for hash/compression functions usi...
Abstract. The main contributions of this paper are two-fold. Firstly, we present a novel direction i...
We present in this article a freestart collision example for SHA-1, i.e., a collision for its intern...