This is the first article analyzing the security of SHA-256 against fast collision search which considers the recent attacks by Wang et al. We show the limits of applying techniques known so far to SHA-256. Next we introduce a new type of perturbation vector which circumvents the identified limits. This new technique is then applied to the unmodified SHA-256. Exploiting the combination of Boolean functions and modular addition together with the newly developed technique allows us to derive collision-producing characteristics for step-reduced SHA-256, which was not possible before. Although our results do not threaten the security of SHA-256, we show that the low probability of a single local collision may give rise to a false sense of secur...
Abstract. In this paper, we present new collision search attacks on the hash function SHA-1. We show...
International audienceIn this paper we analyze the security of the compression function of SHA-1 aga...
The concept of counter-cryptanalysis and a collision detection algorithm that detects whether a give...
www.iaik.tugraz.at/research/krypto Abstract. This is the first article analyzing the security of SHA...
This is the first article analyzing the security of SHA-256 against fast collision search which cons...
We study the security of step-reduced but otherwise unmodified SHA-256. We show the first collision ...
Abstract. We study the security of step-reduced but otherwise unmod-ified SHA-256. We show the first...
Abstract. In this paper, we focus on the construction of semi-free-start collisions for SHA-256, and...
SHA-1 is a widely used cryptographic hashing algorithm for validating the integrity of data. Until r...
Abstract. In this paper we describe improvements to the techniques used to cryptanalyze SHA-0 and in...
In this paper we analyse the role of some of the building blocks of SHA-256. We show that the distur...
The main contributions of this paper are two-fold. Firstly, we present a novel direction in the ...
Abstract: In this paper we analyse the role of some of the building blocks of SHA-256. We show that ...
Abstract. In this paper, we present new collision search attacks on the hash function SHA-1. We show...
Abstract. In this work, we introduce a new non-random property for hash/compression functions using ...
Abstract. In this paper, we present new collision search attacks on the hash function SHA-1. We show...
International audienceIn this paper we analyze the security of the compression function of SHA-1 aga...
The concept of counter-cryptanalysis and a collision detection algorithm that detects whether a give...
www.iaik.tugraz.at/research/krypto Abstract. This is the first article analyzing the security of SHA...
This is the first article analyzing the security of SHA-256 against fast collision search which cons...
We study the security of step-reduced but otherwise unmodified SHA-256. We show the first collision ...
Abstract. We study the security of step-reduced but otherwise unmod-ified SHA-256. We show the first...
Abstract. In this paper, we focus on the construction of semi-free-start collisions for SHA-256, and...
SHA-1 is a widely used cryptographic hashing algorithm for validating the integrity of data. Until r...
Abstract. In this paper we describe improvements to the techniques used to cryptanalyze SHA-0 and in...
In this paper we analyse the role of some of the building blocks of SHA-256. We show that the distur...
The main contributions of this paper are two-fold. Firstly, we present a novel direction in the ...
Abstract: In this paper we analyse the role of some of the building blocks of SHA-256. We show that ...
Abstract. In this paper, we present new collision search attacks on the hash function SHA-1. We show...
Abstract. In this work, we introduce a new non-random property for hash/compression functions using ...
Abstract. In this paper, we present new collision search attacks on the hash function SHA-1. We show...
International audienceIn this paper we analyze the security of the compression function of SHA-1 aga...
The concept of counter-cryptanalysis and a collision detection algorithm that detects whether a give...