International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR Local Search

Possible queries include homomorphic author:david.
Found 20000 results
Preimages for Reduced SHA-0 and SHA-1
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=23871
Christophe De Cannière Christian Rechberger
Crypto 2008
Finding SHA-1 Characteristics: General Results and Applications
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=73
Christophe De Cannière Christian Rechberger
Asiacrypt 2006
Collisions of SHA-0 and Reduced SHA-1
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=2049
Eli Biham Rafi Chen Antoine Joux Patrick Carribault Christophe Lemuet William Jalby
Eurocrypt 2005
Asiacrypt2006
https://iacr.org/conferences/asiacrypt2006/Program.htm
ASIACRYPT2006 Asiacrypt2006 Home Committee Information Call For Papers Paper Submission Accepted Papers Conference Program Rump Session Conference Venue Accommodation Travel and Visa Registration Sponsors Organizer Program of...
Asiacrypt2006
https://iacr.org/conferences/asiacrypt2006/AcceptedPaper.htm
ASIACRYPT2006 Asiacrypt2006 Home Committee Information Call For Papers Paper Submission Accepted Papers Conference Program Rump Session Conference Venue Accommodation Travel and Visa Registration Sponsors Organizer Aisacrypt...
IACR CRYPTO 2008: Advances in Cryptology
https://iacr.org/archive/crypto2008/crypto2008.html
Much of the information on this web page was provided courtesy of Michael Ley and the DBLP Project CRYPTO 2008: David Wagner (Ed.): Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa...
Crypto 2008: Program
https://iacr.org/conferences/crypto2008/program2.html
 Crypto 2008: Program CRYPTO 2008 Preliminary Program All events in Campbell Hall (unless otherwise noted) Sponsorship: Student scholarships were funded by Qualcomm and PGP. General support was offered by Microsoft Research,...
Crypto 2008: Program
https://iacr.org/conferences/crypto2008/program.html
 Crypto 2008: Program CRYPTO 2008 Program All events in Campbell Hall (unless otherwise noted) Click here for printable version Sponsorship: Student scholarships were funded by Qualcomm and PGP. General support was offered by...
Cryptanalysis of SHA-0 and Reduced SHA-1
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=26009
Eli Biham Rafi Chen Antoine Joux
Jofc 2015
Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=23912
Kazumaro Aoki Yu Sasaki
Crypto 2009
IACR FSE 2012
https://iacr.org/archive/fse2012/fse2012-index.html
FSE 2012: Anne Canteaut (Ed.): Fast Software Encryption - 19th International Workshop - FSE 2012, FSE 2012, Washington, DC, USA, March 19-21, 2012 Proceedings. FSE 2012 Washington, DC, USA, March 19-21, 2012 Preface by Anne...
IACR FSE 2011
https://iacr.org/archive/fse2011/fse2011-index.html
FSE 2011: Antoine Joux (Eds.): Fast Software Encryption - 18th International Workshop - FSE 2011, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers Proceedings. FSE 2011 Lyngby, Denmark, February 13-16,...
IACR ASIACRYPT 2006
https://iacr.org/archive/asiacrypt2006/asiacrypt2006.html
Much of the information on this web page was provided courtesy of Michael Ley and the DBLP Project ASIACRYPT 2006: Shanghai, China Xuejia Lai and Kefei Chen (Eds.): Advances in Cryptology - ASIACRYPT 2006 12th International...
Tentative Schedule
https://iacr.org/workshops/fse2012/preproceedings/index.html
Tentative Schedule The program is available as a pdf here . Monday 19 March 2012 9:00 - 9:55: Registration 9:55 - 10:00: General Chair's Opening Remarks Session I — Block ciphers 10:00 - 10:25: Improved Attacks on Full GOST...
IACR FSE 2009
https://iacr.org/archive/fse2009/fse2009.html
FSE 2009: Orr Dunkelman (Ed.): Fast Software Encryption - FSE 2009, Leuven, Belgium, February 22--25, 2009 Proceedings. FSE 2009 Preface by Orr Dunkelman (Eds.): Organizational Committee Program Chairs : Orr Dunkelman General...
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1
Eprint
https://eprint.iacr.org/2006/187
Jongsung Kim Alex Biryukov Bart Preneel Seokhie Hong
HMAC is a widely used message authentication code and a pseudorandom function generator based on cryptographic hash functions such as MD5 and SHA-1. It has been standardized by ANSI, IETF, ISO and NIST. HMAC is proved to be...
received 12 Jun 2006
Christophe De Cannière
Author
https://iacr.org/cryptodb/data/author.php?authorkey=104
K.U.Leuven
IACR CRYPTO 2009
https://iacr.org/archive/crypto2009/crypto2009.html
CRYPTO 2009: Shai Halevi (Eds.): Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009 Proceedings. CRYPTO 2009 Santa Barbara, CA, USA, August 16-20,...
Attacking Reduced Round SHA-256
Eprint
https://eprint.iacr.org/2008/142
Somitra Kumar Sanadhya Palash Sarkar
The SHA-256 hash function has started getting attention recently by the cryptanalysis community due to the various weaknesses found in its predecessors such as MD4, MD5, SHA-0 and SHA-1. We make two contributions in this work....
last revised 15 May 2008
Collisions for 72-step and 73-step SHA-1: Improvements in the Method of Characteristics
Eprint
https://eprint.iacr.org/2010/413
E.A.Grechnikov
We present a brief report on the collision search for the reduced SHA-1. With a few improvements to the De Canni\`ere-Rechberger automatic collision search method we managed to construct two new collisions for 72- and 73-step...
received 23 Jul 2010
Next ►