Sciweavers

2 search results - page 1 / 1
» Second-Preimage Analysis of Reduced SHA-1
Sort
View
ACISP
2010
Springer
15 years 11 days ago
Second-Preimage Analysis of Reduced SHA-1
Many applications using cryptographic hash functions do not require collision resistance, but some kind of preimage resistance. That's also the reason why the widely used SHA-...
Christian Rechberger
119
Voted
CRYPTO
2008
Springer
163views Cryptology» more  CRYPTO 2008»
15 years 4 months ago
Cryptanalysis of the GOST Hash Function
In this article, we analyze the security of the GOST hash function. The GOST hash function, defined in the Russian standard GOST 34.11-94, is an iterated hash function producing a ...
Florian Mendel, Norbert Pramstaller, Christian Rec...