Sciweavers

3 search results - page 1 / 1
» Hash Functions and the (Amplified) Boomerang Attack
Sort
View
CRYPTO
2007
Springer
149views Cryptology» more  CRYPTO 2007»
14 years 2 months ago
Hash Functions and the (Amplified) Boomerang Attack
Abstract. Since Crypto 2004, hash functions have been the target of many attacks which showed that several well-known functions such as SHA-0 or MD5 can no longer be considered sec...
Antoine Joux, Thomas Peyrin
FSE
2008
Springer
162views Cryptology» more  FSE 2008»
14 years 16 days ago
Collisions on SHA-0 in One Hour
At Crypto 2007, Joux and Peyrin showed that the boomerang attack, a classical tool in block cipher cryptanalysis, can also be very useful when analyzing hash functions. They applie...
Stéphane Manuel, Thomas Peyrin
ASIACRYPT
2009
Springer
14 years 5 months ago
Improved Cryptanalysis of Skein
The hash function Skein is the submission of Ferguson et al. to the NIST Hash Competition, and is arguably a serious candidate for selection as SHA-3. This paper presents the firs...
Jean-Philippe Aumasson, Çagdas Çalik...