Loading…
New strategy for searching disturbance vector of SHA-1 collision attack
Dear editor,We present a new algorithm to search for effective disturbance vectors with a complexity of 2~(38)based on the following two properties of disturbance vectors.One property is the weight correlation between the first 16-step disturbance vectors and the60-step disturbance vectors.The other...
Saved in:
Published in: | Science China. Information sciences 2017-12, Vol.60 (12), p.276-278, Article 129101 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | cdi_FETCH-LOGICAL-c338t-1bef3dc8a592a6cea5c34e8d7042df5dbd6f8ce4f9da3987f33b8e8439c354313 |
container_end_page | 278 |
container_issue | 12 |
container_start_page | 276 |
container_title | Science China. Information sciences |
container_volume | 60 |
creator | Feng, Hao Zeng, Guang Han, Wenbao Yang, Yang |
description | Dear editor,We present a new algorithm to search for effective disturbance vectors with a complexity of 2~(38)based on the following two properties of disturbance vectors.One property is the weight correlation between the first 16-step disturbance vectors and the60-step disturbance vectors.The other property requires all the differences of the active bit positions of the first 16-step disturbance vectors to be |
doi_str_mv | 10.1007/s11432-016-9241-x |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2918579606</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><cqvip_id>673840374</cqvip_id><sourcerecordid>2918579606</sourcerecordid><originalsourceid>FETCH-LOGICAL-c338t-1bef3dc8a592a6cea5c34e8d7042df5dbd6f8ce4f9da3987f33b8e8439c354313</originalsourceid><addsrcrecordid>eNp9kEFLAzEQhYMoWLQ_wFvQczTZyW6SYynaCkUPKngL2Wyy3Vp322Sr7b83pUVvzmUG5n3vwUPoitFbRqm4i4xxyAhlBVEZZ2R7ggZMFoowxdRpugvBiQB4P0fDGBc0DQDNhBygyZP7xrEPpnf1Dvsu4OhMsPOmrXHVxH4TStNah7-c7dOz8_hlOiIM2265bGLTtdj0vbEfl-jMm2V0w-O-QG8P96_jKZk9Tx7HoxmxALInrHQeKitNrjJTWGdyC9zJSlCeVT6vyqrw0jruVWVASeEBSukkB2Uh58DgAt0cfFehW29c7PWi24Q2RepMMZkLVdAiqdhBZUMXY3Ber0LzacJOM6r3lelDZTpVpveV6W1isgMTk7atXfhz_g-6PgbNu7ZeJ-43qRAgOQXB4QfhB3o7</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2918579606</pqid></control><display><type>article</type><title>New strategy for searching disturbance vector of SHA-1 collision attack</title><source>Springer Nature</source><creator>Feng, Hao ; Zeng, Guang ; Han, Wenbao ; Yang, Yang</creator><creatorcontrib>Feng, Hao ; Zeng, Guang ; Han, Wenbao ; Yang, Yang</creatorcontrib><description>Dear editor,We present a new algorithm to search for effective disturbance vectors with a complexity of 2~(38)based on the following two properties of disturbance vectors.One property is the weight correlation between the first 16-step disturbance vectors and the60-step disturbance vectors.The other property requires all the differences of the active bit positions of the first 16-step disturbance vectors to be</description><identifier>ISSN: 1674-733X</identifier><identifier>EISSN: 1869-1919</identifier><identifier>DOI: 10.1007/s11432-016-9241-x</identifier><language>eng</language><publisher>Beijing: Science China Press</publisher><subject>Computer Science ; Information Systems and Communication Service ; Letter ; SHA-1 ; 向量 ; 属性 ; 性能要求 ; 扰动 ; 搜索 ; 碰撞攻击 ; 阶跃</subject><ispartof>Science China. Information sciences, 2017-12, Vol.60 (12), p.276-278, Article 129101</ispartof><rights>Science China Press and Springer-Verlag GmbH Germany, part of Springer Nature 2017</rights><rights>Science China Press and Springer-Verlag GmbH Germany, part of Springer Nature 2017.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c338t-1bef3dc8a592a6cea5c34e8d7042df5dbd6f8ce4f9da3987f33b8e8439c354313</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttp://image.cqvip.com/vip1000/qk/84009A/84009A.jpg</thumbnail><link.rule.ids>314,777,781,27905,27906</link.rule.ids></links><search><creatorcontrib>Feng, Hao</creatorcontrib><creatorcontrib>Zeng, Guang</creatorcontrib><creatorcontrib>Han, Wenbao</creatorcontrib><creatorcontrib>Yang, Yang</creatorcontrib><title>New strategy for searching disturbance vector of SHA-1 collision attack</title><title>Science China. Information sciences</title><addtitle>Sci. China Inf. Sci</addtitle><addtitle>SCIENCE CHINA Information Sciences</addtitle><description>Dear editor,We present a new algorithm to search for effective disturbance vectors with a complexity of 2~(38)based on the following two properties of disturbance vectors.One property is the weight correlation between the first 16-step disturbance vectors and the60-step disturbance vectors.The other property requires all the differences of the active bit positions of the first 16-step disturbance vectors to be</description><subject>Computer Science</subject><subject>Information Systems and Communication Service</subject><subject>Letter</subject><subject>SHA-1</subject><subject>向量</subject><subject>属性</subject><subject>性能要求</subject><subject>扰动</subject><subject>搜索</subject><subject>碰撞攻击</subject><subject>阶跃</subject><issn>1674-733X</issn><issn>1869-1919</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><recordid>eNp9kEFLAzEQhYMoWLQ_wFvQczTZyW6SYynaCkUPKngL2Wyy3Vp322Sr7b83pUVvzmUG5n3vwUPoitFbRqm4i4xxyAhlBVEZZ2R7ggZMFoowxdRpugvBiQB4P0fDGBc0DQDNhBygyZP7xrEPpnf1Dvsu4OhMsPOmrXHVxH4TStNah7-c7dOz8_hlOiIM2265bGLTtdj0vbEfl-jMm2V0w-O-QG8P96_jKZk9Tx7HoxmxALInrHQeKitNrjJTWGdyC9zJSlCeVT6vyqrw0jruVWVASeEBSukkB2Uh58DgAt0cfFehW29c7PWi24Q2RepMMZkLVdAiqdhBZUMXY3Ber0LzacJOM6r3lelDZTpVpveV6W1isgMTk7atXfhz_g-6PgbNu7ZeJ-43qRAgOQXB4QfhB3o7</recordid><startdate>20171201</startdate><enddate>20171201</enddate><creator>Feng, Hao</creator><creator>Zeng, Guang</creator><creator>Han, Wenbao</creator><creator>Yang, Yang</creator><general>Science China Press</general><general>Springer Nature B.V</general><scope>2RA</scope><scope>92L</scope><scope>CQIGP</scope><scope>W92</scope><scope>~WA</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>20171201</creationdate><title>New strategy for searching disturbance vector of SHA-1 collision attack</title><author>Feng, Hao ; Zeng, Guang ; Han, Wenbao ; Yang, Yang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c338t-1bef3dc8a592a6cea5c34e8d7042df5dbd6f8ce4f9da3987f33b8e8439c354313</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Computer Science</topic><topic>Information Systems and Communication Service</topic><topic>Letter</topic><topic>SHA-1</topic><topic>向量</topic><topic>属性</topic><topic>性能要求</topic><topic>扰动</topic><topic>搜索</topic><topic>碰撞攻击</topic><topic>阶跃</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Feng, Hao</creatorcontrib><creatorcontrib>Zeng, Guang</creatorcontrib><creatorcontrib>Han, Wenbao</creatorcontrib><creatorcontrib>Yang, Yang</creatorcontrib><collection>维普_期刊</collection><collection>中文科技期刊数据库-CALIS站点</collection><collection>中文科技期刊数据库-7.0平台</collection><collection>中文科技期刊数据库-工程技术</collection><collection>中文科技期刊数据库- 镜像站点</collection><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Databases</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Science China. Information sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Feng, Hao</au><au>Zeng, Guang</au><au>Han, Wenbao</au><au>Yang, Yang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>New strategy for searching disturbance vector of SHA-1 collision attack</atitle><jtitle>Science China. Information sciences</jtitle><stitle>Sci. China Inf. Sci</stitle><addtitle>SCIENCE CHINA Information Sciences</addtitle><date>2017-12-01</date><risdate>2017</risdate><volume>60</volume><issue>12</issue><spage>276</spage><epage>278</epage><pages>276-278</pages><artnum>129101</artnum><issn>1674-733X</issn><eissn>1869-1919</eissn><abstract>Dear editor,We present a new algorithm to search for effective disturbance vectors with a complexity of 2~(38)based on the following two properties of disturbance vectors.One property is the weight correlation between the first 16-step disturbance vectors and the60-step disturbance vectors.The other property requires all the differences of the active bit positions of the first 16-step disturbance vectors to be</abstract><cop>Beijing</cop><pub>Science China Press</pub><doi>10.1007/s11432-016-9241-x</doi><tpages>3</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1674-733X |
ispartof | Science China. Information sciences, 2017-12, Vol.60 (12), p.276-278, Article 129101 |
issn | 1674-733X 1869-1919 |
language | eng |
recordid | cdi_proquest_journals_2918579606 |
source | Springer Nature |
subjects | Computer Science Information Systems and Communication Service Letter SHA-1 向量 属性 性能要求 扰动 搜索 碰撞攻击 阶跃 |
title | New strategy for searching disturbance vector of SHA-1 collision attack |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-18T23%3A06%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=New%20strategy%20for%20searching%20disturbance%20vector%20of%20SHA-1%20collision%20attack&rft.jtitle=Science%20China.%20Information%20sciences&rft.au=Feng,%20Hao&rft.date=2017-12-01&rft.volume=60&rft.issue=12&rft.spage=276&rft.epage=278&rft.pages=276-278&rft.artnum=129101&rft.issn=1674-733X&rft.eissn=1869-1919&rft_id=info:doi/10.1007/s11432-016-9241-x&rft_dat=%3Cproquest_cross%3E2918579606%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c338t-1bef3dc8a592a6cea5c34e8d7042df5dbd6f8ce4f9da3987f33b8e8439c354313%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2918579606&rft_id=info:pmid/&rft_cqvip_id=673840374&rfr_iscdi=true |