File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Full metadata record

DC Field Value Language
dc.citation.conferencePlace KO -
dc.citation.endPage 295 -
dc.citation.startPage 286 -
dc.citation.title ICISC 2006 : Information Security and Cryptology -
dc.contributor.author Yun, Aaram -
dc.contributor.author Sung, Soo Hak -
dc.contributor.author Park, Sangwoo -
dc.contributor.author Cho, Hong-Su -
dc.date.accessioned 2023-12-20T05:07:13Z -
dc.date.available 2023-12-20T05:07:13Z -
dc.date.created 2014-12-23 -
dc.date.issued 2006-11-30 -
dc.description.abstract HAS-160 is a cryptographic hash function which is designed and used widely in Korea. In ICISC 2005, Yun et al. presented a collision search attack for the first 45 steps of HAS-160. In this paper, we extend the result to the first 53 steps of HAS-160. The time complexity of the attack is about 2. -
dc.identifier.bibliographicCitation ICISC 2006 : Information Security and Cryptology, pp.286 - 295 -
dc.identifier.uri https://scholarworks.unist.ac.kr/handle/201301/45461 -
dc.publisher Korea Institute of Information Security and Cryptology -
dc.title Collision Search Attack for 53-Step HAS-160 -
dc.type Conference Paper -
dc.date.conferenceDate 2006-11-30 -

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.