The main contributions of this paper are two-fold. Firstly, we present a novel direction in the cryptanalysis of the cryptographic hash function {\SHA}. Our work builds on previous cryptanalytic efforts on {\SHA} based on combinations of local collisions. Due to dependencies, previous approaches used heuristic corrections when combining the success probabilities and message conditions of the individual local collisions. Although this leads to success probabilities that are seemingly sufficient for feasible collision attacks, this approach most often does not lead to the maximum success probability possible as desired. We introduce novel techniques that enable us to determine the theoretical maximum success probability for a given se...
International audienceA chosen-prefix collision attack is a stronger variant of a collision attack, ...
The Keccak sponge function family, designed by Bertoni et al. in 2007, was selected by the U.S. Nati...
SHA-1 is a widely used 1995 NIST cryptographic hash function standard that was officially deprecated...
Abstract. The main contributions of this paper are two-fold. Firstly, we present a novel direction i...
Abstract. In this paper, we focus on the construction of semi-free-start collisions for SHA-256, and...
Abstract. In this paper, we present new collision search attacks on the hash function SHA-1. We show...
Abstract. In this paper, we present new collision search attacks on the hash function SHA-1. We show...
Abstract. The starting point for collision attacks on practical hash functions is a local collision....
International audienceIn this paper we analyze the security of the compression function of SHA-1 aga...
Counter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks...
In this paper we analyze the security of the compression function of SHA-1 against collision attack...
The concept of counter-cryptanalysis and a collision detection algorithm that detects whether a give...
Abstract. In this paper we describe improvements to the techniques used to cryptanalyze SHA-0 and in...
SHA-1 is a widely used cryptographic hashing algorithm for validating the integrity of data. Until r...
Recent attacks on hash functions start by constructing a differential characteristic. By finding mes...
International audienceA chosen-prefix collision attack is a stronger variant of a collision attack, ...
The Keccak sponge function family, designed by Bertoni et al. in 2007, was selected by the U.S. Nati...
SHA-1 is a widely used 1995 NIST cryptographic hash function standard that was officially deprecated...
Abstract. The main contributions of this paper are two-fold. Firstly, we present a novel direction i...
Abstract. In this paper, we focus on the construction of semi-free-start collisions for SHA-256, and...
Abstract. In this paper, we present new collision search attacks on the hash function SHA-1. We show...
Abstract. In this paper, we present new collision search attacks on the hash function SHA-1. We show...
Abstract. The starting point for collision attacks on practical hash functions is a local collision....
International audienceIn this paper we analyze the security of the compression function of SHA-1 aga...
Counter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks...
In this paper we analyze the security of the compression function of SHA-1 against collision attack...
The concept of counter-cryptanalysis and a collision detection algorithm that detects whether a give...
Abstract. In this paper we describe improvements to the techniques used to cryptanalyze SHA-0 and in...
SHA-1 is a widely used cryptographic hashing algorithm for validating the integrity of data. Until r...
Recent attacks on hash functions start by constructing a differential characteristic. By finding mes...
International audienceA chosen-prefix collision attack is a stronger variant of a collision attack, ...
The Keccak sponge function family, designed by Bertoni et al. in 2007, was selected by the U.S. Nati...
SHA-1 is a widely used 1995 NIST cryptographic hash function standard that was officially deprecated...