A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search
スポンサーリンク
概要
- 論文の詳細を見る
- 2009-01-01
著者
-
YAJIMA Jun
FUJITSU LABORATORIES Ltd.
-
KUNIHIRO Noboru
The University of Tokyo
-
OHTA Kazuo
University of Electro-Communications
-
SASAKI Yu
University of Electro-Communications
-
Naito Yusuke
University Of Electro-communications
-
OHTA Kazuo
The University of Electro-Communications
-
IWASAKI Terutoshi
Chuo University
-
NAITO Yusuke
The University of Electro-Communications
-
SASAKI Yu
The University of Electro-Communications
-
SHIMOYAMA Takeshi
FUJITSU LABORATORIES LTD.
-
PEYRIN Thomas
Versailles Saint-Quentin-en-Yvelines University
-
Kunihiro Noboru
The University Of Electro-communications
-
Ohta Kazuo
Department Of Informatics The University Of Electro-communications
-
Kunihiro Noboru
Univ. Tokyo Kashiwa‐shi Jpn
-
SHIMOYAMA Takeshi
FUJITSU LABORATORIES Ltd
関連論文
- Collision-Based Power Attack for RSA with Small Public Exponent
- New Conditions for Secure Knapsack Schemes against Lattice Attack
- Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC
- Extending Bleichenbachers Forgery Attack
- Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication
- Toward the Fair Anonymous Signatures : Deniable Ring Signatures(Signatures,Cryptography and Information Security)
- Security of Cryptosystems Using Merkle-Damgård in the Random Oracle Model
- Small Secret CRT-Exponent Attacks on Takagis RSA
- Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition
- New Conditions for Secure Knapsack Schemes against Lattice Attack
- Cryptanalysis of Two MD5-Based Authentication Protocols : APOP and NMAC
- Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols
- Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication
- A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search
- New Message Differences for Collision Attacks on MD4 and MD5
- Improved Collision Attacks on MD4 and MD5(Hash Functions,Cryptography and Information Security)
- Universally composable client-to-client general authenticated key exchange (特集:情報システムを支えるコンピュータセキュリティ技術の再考)
- Universally Composable Client-to-Client General Authenticated Key Exchange
- Collision-Based Power Attack for RSA with Small Public Exponent
- A Combinatorics Proliferation Model with Threshold for Malware Countermeasure
- On Clock-Based Fault Analysis Attack for an AES Hardware Using RSL
- Universally Composable Hierarchical Hybrid Authenticated Key Exchange(Protocols,Cryptography and Information Security)
- Compact Architecture for ASIC Implementation of the MISTY1 Block Cipher
- Small Secret Key Attack on a Takagi's Variant of RSA
- Theoretical Analysis of x^2 Attack on RC6 (Symmetric Cipher) (Cryptography and Information Security)
- Improved Collision Search for Hash Functions : New Advanced Message Modification
- Provably Secure Untraceable Electronic Cash against Insider Attacks(Discrete Mathematics and Its Applications)
- Probabilistic Multi-Signature Schemes Using a One-Way Trapdoor Permutation(Discrete Mathematics and Its Applications)
- OAEP-ES : Methodology of Universal Padding Technique (Asymmetric Cipher) (Cryptography and Information Security)
- Solutions to Security Problems of Rivest and Shamir's Pay Word Scheme(Application)(Cryptography and Information Security)
- Provably Secure Multisignatures in Formal Security Model and Their Optimality
- Taxonomical Security Consideration of OAEP Variants(Discrete Mathematics and Its Applications)
- Power Analysis against a DPA-Resistant S-Box Implementation Based on the Fourier Transform
- Public Key Encryption Schemes from the (B)CDH Assumption with Better Efficiency
- Near-Collision Attacks on MD4 : Applied to MD4-Based Protocols
- Maurer-Yacobi ID-Based Key Distribution Revisited(Discrete Mathematics and Its Applications)
- An Efficient Interpolation Attack(Special Section on Cryptography and Information Security)
- Security of Cryptosystems Using Merkle-Damgard in the Random Oracle Model
- Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares(Discrete Mathematics and Its Applications)
- Ring signatures: universally composable definitions and constructions (特集:情報システムを支えるコンピュータセキュリティ技術の再考)
- A-7-2 Revisiting Zero-Knowledgeness of an On the Fly Authentication Scheme
- Differential-Linear Cryptanalysis of FEAL-8 (Special Section on Cryptography and Information Security)
- Leaky Random Oracle
- FOREWORD
- Improved Higher Order Differential Attack and Its Application to Nyberg-Knudsen's Designed Block Cipher
- Universally Composable NBAC-Based Fair Voucher Exchange for Mobile Environments
- How to Shorten a Ciphertext of Reproducible Key Encapsulation Mechanisms in the Random Oracle Model
- Compact Architecture for ASIC and FPGA Implementation of the KASUMI Block Cipher
- Preimage Attacks on the Step-Reduced RIPEMD-128 and RIPEMD-160
- Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions RIPEMD and RIPEMD-128
- On the Hardness of Subset Sum Problem from Different Intervals
- Toward Effective Countermeasures against an Improved Fault Sensitivity Analysis
- Proxiable Designated Verifier Signature
- A New Type of Fault-Based Attack: Fault Behavior Analysis
- Ring Signatures: Universally Composable Definitions and Constructions
- Key Length Estimation of Pairing-Based Cryptosystems Using ηT Pairing over GF(3n)
- Extending Bleichenbacher's Forgery Attack
- Preimage Attacks on the Step-Reduced RIPEMD-128 and RIPEMD-160
- A New Type of Fault-Based Attack : Fault Behavior Analysis