International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR Local Search

Possible queries include homomorphic author:david.
Found 20000 results
Branching Heuristics in Differential Collision Search with Applications to SHA-512
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=27558
Maria Eichlseder Florian Mendel Martin Schläffer
Fse 2014
Branching Heuristics in Differential Collision Search with Applications to SHA-512
Eprint
https://eprint.iacr.org/2014/302
Maria Eichlseder Florian Mendel Martin Schläffer
In this work, we present practical semi-free-start collisions for SHA-512 on up to 38 (out of 80) steps with complexity $2^{40.5}$. The best previously published result was on 24 steps. The attack is based on extending local...
received 29 Apr 2014
IACR FSE 2014
https://iacr.org/archive/fse2014/fse2014-index.html
FSE 2014: Christian Rechberger and Carlos Cid (Eds.): Fast Software Encryption - 20th International Workshop FSE 2014, London, United Kingdom, March 3-5, 2014 Proceedings. FSE 2014 Preface by Christian Rechberger and Carlos...
FSE 2014 - International Workshop on Fast Software Encryption 2014 - London, United Kingdom
https://iacr.org/workshops/fse2014/index.php-p=accepted.htm
FSE 2014 March 3 - March 5 London, UK 21st International Workshop on Fast Software Encryption Home Event Program » Accepted Papers » Call for Papers » Paper Submission » Rump Session » Registration » Stipends » Practical info...
FSE 2014 - International Workshop on Fast Software Encryption 2014 - London, United Kingdom
https://iacr.org/workshops/fse2014/index.php-p=program.htm
FSE 2014 March 3 - March 5 London, UK 21st International Workshop on Fast Software Encryption Home Event Program » Accepted Papers » Call for Papers » Paper Submission » Rump Session » Registration » Stipends » Practical info...
Analysis of SHA-512/224 and SHA-512/256
Eprint
https://eprint.iacr.org/2016/374
Christoph Dobraunig Maria Eichlseder Florian Mendel
In 2012, NIST standardized SHA-512/224 and SHA-512/256, two truncated variants of SHA-512, in FIPS 180-4. These two hash functions are faster than SHA-224 and SHA-256 on 64-bit platforms, while maintaining the same hash size...
received 13 Apr 2016
Asiacrypt 2015
https://iacr.org/conferences/asiacrypt2015/acc.html
Home Technical Program Call for Papers Paper Submissions Accepted Papers Program Invited Speakers Rump Session General Information Venue Registration Travel and visas Accommodation Stipends Speaker Instructions Contact...
Analysis of SHA-512/224 and SHA-512/256
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=27354
Christoph Dobraunig Maria Eichlseder Florian Mendel
Asiacrypt 2015
IACR ASIACRYPT 2015
https://iacr.org/archive/asiacrypt2015/asiacrypt2015-index.html
ASIACRYPT 2015: Tetsu Iwata and Jung Hee Cheon (Eds.): Advances in Cryptology ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security Auckland, New Zealand, November...
Cryptanalysis of Ascon
Eprint
https://eprint.iacr.org/2015/030
Christoph Dobraunig Maria Eichlseder Florian Mendel Martin Schläffer
We present a detailed security analysis of the CAESAR candidate Ascon. Amongst others, cube-like, differential and linear cryptanalysis are used to evaluate the security of Ascon. Our results are practical key-recovery attacks...
last revised 31 Jul 2017
IACR FSE 2015
https://iacr.org/archive/fse2015/fse2015-index.html
FSE 2015: Gregor Leander (Ed.): Fast Software Encryption - 21st International Workshop FSE 2015, Istanbul, Turkey March 8 - 11, 2015 Proceedings. FSE 2015 Preface by Gregor Leander (Ed.): Organizational Committee Program...
Improving Local Collisions: New Attacks on Reduced SHA-256
Eprint
https://eprint.iacr.org/2015/350
Florian Mendel Tomislav Nad Martin Schläffer
In this paper, we focus on the construction of semi-free-start collisions for SHA-256, and show how to turn them into collisions. We present a collision attack on 28 steps of the hash function with practical complexity. Using...
received 20 Apr 2015
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates
Eprint
https://eprint.iacr.org/2015/1200
Christoph Dobraunig Maria Eichlseder Florian Mendel
Differential and linear cryptanalysis are the general purpose tools to analyze various cryptographic primitives. Both techniques have in common that they rely on the existence of good differential or linear characteristics....
last revised 12 Jul 2017
IACR FSE 2016
https://iacr.org/archive/fse2016/fse2016-index.html
FSE 2016: Thomas Peyrin (Ed.): Fast Software Encryption - 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers Proceedings. FSE 2016 Preface by Thomas Peyrin (Ed.):...
Improved Cryptanalysis of Reduced RIPEMD-160
Eprint
https://eprint.iacr.org/2013/600
Florian Mendel Thomas Peyrin Martin Schläffer Lei Wang Shuang Wu
In this article, we propose an improved cryptanalysis of the double-branch hash function standard RIPEMD-160. Using a carefully designed non-linear path search tool, we study the potential differential paths that can be...
received 17 Sep 2013
FSE 2017 - International Conference on Fast Software Encryption 2017 - Tokyo, Japan
https://iacr.org/workshops/fse2017/program.html
FSE 2017 March 5-8, 2017 Tokyo, Japan 24th International Conference on Fast Software Encryption Home Event Call for Papers Program Committee/Editorial Board Paper Submission Program Accepted Papers Sponsors Contact...
Collision Attack on 5 Rounds of Grøstl
Eprint
https://eprint.iacr.org/2014/305
Florian Mendel Vincent Rijmen Martin Schläffer
In this article, we describe a novel collision attack for up to 5 rounds of the Grøstl hash function. This significantly improves upon the best previously published results on 3 rounds. By using a new type of differential...
received 30 Apr 2014
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=27391
Christoph Dobraunig Maria Eichlseder Florian Mendel
Asiacrypt 2015
Malicious Hashing: Eve's Variant of SHA-1
Eprint
https://eprint.iacr.org/2014/694
Ange Albertini Jean-Philippe Aumasson Maria Eichlseder Florian Mendel Martin Schläffer
We present collisions for a version of SHA-1 with modified constants, where the colliding payloads are valid binary files. Examples are given of colliding executables, archives, and images. Our malicious SHA-1 instances have...
received 3 Sep 2014
Collisions and other Non-Random Properties for Step-Reduced SHA-256
Eprint
https://eprint.iacr.org/2008/131
Sebastiaan Indesteege Florian Mendel Bart Preneel Christian Rechberger
We study the security of step-reduced but otherwise unmodified SHA-256. We show the first collision attacks on SHA-256 reduced to 23 and 24 steps with complexities $2^{18}$ and $2^{28.5}$, respectively. We give example...
last revised 15 Jul 2008
Next ►