Abstract. The Secure Hash Standard (SHS) [3] includes hashing algo- rithms denoted SHA-n, n ∈ 224, 256, 384, 512 for producing message di-.
ArticlePDF Available. On Corrective Patterns for the SHA2 Family. September 2004. Source; CiteSeer. Authors: Philip Hawkes at Qualcomm · Philip Hawkes.
People also ask
What is the SHA-2 family of algorithms?
What are the disadvantages of SHA-2?
What is the alternative to SHA-2?
What is the difference between SHA-1 and SHA-2?
Most of the attacks against (reduced) SHA-2 family in literature have used local collisions which are valid for linearized version of SHA-2 hash functions.
In this work, we study several properties of the SHA-2 design which have been utilized in recent collision attacks against reduced round SHA-2.
This analysis explains in a unified way the recent attacks against reduced round SHA-2 in a general class of local collisions and shows that the previously ...
In this paper, we make a systematic study of local collisions for the SHA-2 family. ... On corrective patterns for the SHA-2 family. Cryptology ePrint Archive ...
In this article we analyze the message expansion of the SHA-2 family of hash functions. Upper bounds on the minimal weight of different variants of the message ...
Sanadhya and Sarkar [7] presented 16 new 9-step local collisions for. SHA-2 family of hash functions. ... On Corrective Patterns for the SHA-2 Family. Cryptology.
[PDF] A new hash family obtained by modifying the SHA-2 family
typeset.io › pdf › a-new-hash-famil...
Abstract. In this work, we study several properties of the SHA-2 design which have been utilized in recent collision attacks against reduced round SHA-2.
Abstract: In this paper we analyse the role of some of the building blocks in SHA-256. We show that the disturbance correction strategy is applicable to the ...