SHA-512/384

From The ECRYPT Hash Function Website

Jump to: navigation, search

Contents

1 Specification

2 Cryptanalysis

2.1 Best Known Results


2.2 Generic Attacks


2.3 Collision Attacks

Somitra Kumar Sanadhya, Palash Sarkar - Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family
In Proceedings of ISC, LNCS 5222, pp. 244-259, Springer, 2008
[Electronic Edition] [Bibtex]
Author : Somitra Kumar Sanadhya, Palash Sarkar
Title : Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family
In : In Proceedings of ISC -
[Abstract]

Somitra Kumar Sanadhya, Palash Sarkar - Non-linear Reduced Round Attacks against SHA-2 Hash Family
In Proceedings of ACISP, LNCS 5107, pp. 254-266, Springer, 2008
[Electronic Edition] [Bibtex]
Author : Somitra Kumar Sanadhya, Palash Sarkar
Title : Non-linear Reduced Round Attacks against SHA-2 Hash Family
In : In Proceedings of ACISP -
[Abstract]

Henri Gilbert, Helena Handschuh - Security Analysis of SHA-256 and Sisters
In Proceedings of Selected Areas in Cryptography, LNCS 3006, pp. 175-193, Springer, 2003
[Electronic Edition] [Bibtex]
Author : Henri Gilbert, Helena Handschuh
Title : Security Analysis of SHA-256 and Sisters
In : In Proceedings of Selected Areas in Cryptography -
[Abstract]

2.4 Second Preimage Attacks


2.5 Preimage Attacks


2.6 Others

Personal tools