Counter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks, was first introduced by Stevens at CRYPTO 2013 with a hash collision detection algorithm. That is, an algorithm that detects whether a given single message is part of a colliding message pair constructed using a cryptanalytic collision attack on MD5 or SHA-1. The concept\u27s utility was proven when it was used to expose the then-unknown cryptanalytic collision attack exploited by the Flame espionage supermalware. So far there is a significant cost: to detect collision attacks against SHA-1 (respectively MD5) costs the equivalent of hashing the message 15 (respectively 224) times. In this paper we present a significant performance improvem...
This is the first article analyzing the security of SHA-256 against fast collision search which cons...
We introduce \emph{counter-cryptanalysis} as a new paradigm for strengthening weak cryptographic pri...
Cryptographic hash functions compute a small fixed-size hash value for any given message. A main app...
Counter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks...
The concept of counter-cryptanalysis and a collision detection algorithm that detects whether a give...
SHA-1 is a widely used 1995 NIST cryptographic hash function standard that was officially deprecated...
The main contributions of this paper are two-fold. Firstly, we present a novel direction in the ...
We present in this article a freestart collision example for SHA-1, i.e., a collision for its intern...
SHA-1 is a widely used cryptographic hashing algorithm for validating the integrity of data. Until r...
International audienceA chosen-prefix collision attack is a stronger variant of a collision attack, ...
International audienceSHA-1 is a widely used 1995 NIST cryptographic hash function standard that was...
Abstract. In this paper, we present new collision search attacks on the hash function SHA-1. We show...
Abstract. In this paper, we present new collision search attacks on the hash function SHA-1. We show...
Abstract. In this paper we describe improvements to the techniques used to cryptanalyze SHA-0 and in...
International audienceIn this paper we analyze the security of the compression function of SHA-1 aga...
This is the first article analyzing the security of SHA-256 against fast collision search which cons...
We introduce \emph{counter-cryptanalysis} as a new paradigm for strengthening weak cryptographic pri...
Cryptographic hash functions compute a small fixed-size hash value for any given message. A main app...
Counter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks...
The concept of counter-cryptanalysis and a collision detection algorithm that detects whether a give...
SHA-1 is a widely used 1995 NIST cryptographic hash function standard that was officially deprecated...
The main contributions of this paper are two-fold. Firstly, we present a novel direction in the ...
We present in this article a freestart collision example for SHA-1, i.e., a collision for its intern...
SHA-1 is a widely used cryptographic hashing algorithm for validating the integrity of data. Until r...
International audienceA chosen-prefix collision attack is a stronger variant of a collision attack, ...
International audienceSHA-1 is a widely used 1995 NIST cryptographic hash function standard that was...
Abstract. In this paper, we present new collision search attacks on the hash function SHA-1. We show...
Abstract. In this paper, we present new collision search attacks on the hash function SHA-1. We show...
Abstract. In this paper we describe improvements to the techniques used to cryptanalyze SHA-0 and in...
International audienceIn this paper we analyze the security of the compression function of SHA-1 aga...
This is the first article analyzing the security of SHA-256 against fast collision search which cons...
We introduce \emph{counter-cryptanalysis} as a new paradigm for strengthening weak cryptographic pri...
Cryptographic hash functions compute a small fixed-size hash value for any given message. A main app...