Sciweavers

IMA
2005
Springer

Exploiting Coding Theory for Collision Attacks on SHA-1

14 years 6 months ago
Exploiting Coding Theory for Collision Attacks on SHA-1
In this article we show that coding theory can be exploited efficiently for the cryptanalysis of hash functions. We will mainly focus
Norbert Pramstaller, Christian Rechberger, Vincent
Added 27 Jun 2010
Updated 27 Jun 2010
Type Conference
Year 2005
Where IMA
Authors Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
Comments (0)