Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
21
views
12
references
Top references
cited by
5
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,721
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Selected Areas in Cryptography
Collisions for 70-Step SHA-1: On the Full Cost of Collision Search
other
Author(s):
Christophe De Cannière
,
Florian Mendel
,
Christian Rechberger
Publication date
(Print):
2007
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
WikiJournal of Medicine
Most cited references
12
Record
: found
Abstract
: not found
Book Chapter
: not found
Differential collisions in SHA-0
Florent Chabaud
,
Antoine Joux
(1998)
0
comments
Cited
28
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Finding SHA-1 Characteristics: General Results and Applications
Christophe De Cannière
,
Christian Rechberger
(2006)
0
comments
Cited
24
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Efficient Collision Search Attacks on SHA-0
Xiaoyun Wang
,
Hongbo Yu
,
Yiqun Lisa Yin
(2005)
0
comments
Cited
20
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2007
Pages
: 56-73
DOI:
10.1007/978-3-540-77360-3_4
SO-VID:
cd6132fb-e13c-42a9-9fcb-3ab829dc700c
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 84
Improved Side-Channel Collision Attacks on AES
pp. 344
Passive–Only Key Recovery Attacks on RC4
pp. 360
Permutation After RC4 Key Scheduling Reveals the Secret Key
pp. 56
Collisions for 70-Step SHA-1: On the Full Cost of Collision Search
pp. 264
Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings
pp. 278
Cryptanalysis of White Box DES Implementations
Similar content
2,721
Sha Tin sewage treatment works- stage I design and construction
Authors:
The effects of Xiong sha liu jun tan and gegen qin lian tan in colon cancer treatment
Authors:
Lam
Calculated Taste Activity Values and Umami Equivalences Explain Why Dried Sha-chong (
Sipunculus nudus
) Is a Valuable Condiment
Authors:
Ya Liu
,
Chuangping Qiu
,
Liu
…
See all similar
Cited by
5
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
Authors:
Florian Mendel
,
Christian Rechberger
,
Martin Schläffer
…
Rebound Distinguishers: Results on the Full Whirlpool Compression Function
Authors:
Mario Lamberger
,
Florian Mendel
,
Christian Rechberger
…
Practical Free-Start Collision Attacks on 76-step SHA-1
Authors:
Pierre Karpman
,
Thomas Peyrin
,
Marc J.A. Stevens
See all cited by