{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:09:55Z","timestamp":1743026995349,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819609406"},{"type":"electronic","value":"9789819609413"}],"license":[{"start":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T00:00:00Z","timestamp":1733702400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T00:00:00Z","timestamp":1733702400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0941-3_8","type":"book-chapter","created":{"date-parts":[[2024,12,8]],"date-time":"2024-12-08T13:35:20Z","timestamp":1733664920000},"page":"237-266","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The First Practical Collision for\u00a031-Step SHA-256"],"prefix":"10.1007","author":[{"given":"Yingxin","family":"Li","sequence":"first","affiliation":[]},{"given":"Fukang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Gaoli","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiaoyang","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Siwei","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"A.\u00a0Bar-On, O.\u00a0Dunkelman, N.\u00a0Keller, E.\u00a0Ronen, and A.\u00a0Shamir. Improved key recovery attacks on reduced-round AES with practical data and memory complexities. In H.\u00a0Shacham and A.\u00a0Boldyreva, editors, Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II, volume 10992 of Lecture Notes in Computer Science, pages 185\u2013212. Springer, 2018.","DOI":"10.1007\/978-3-319-96881-0_7"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"C.\u00a0D. Canni\u00e8re and C.\u00a0Rechberger. Finding SHA-1 characteristics: General results and applications. In X.\u00a0Lai and K.\u00a0Chen, editors, Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings, volume 4284 of Lecture Notes in Computer Science, pages 1\u201320. Springer, 2006.","DOI":"10.1007\/11935230_1"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"I.\u00a0Damg\u00e5rd. A design principle for hash functions. In G.\u00a0Brassard, editor, Advances in Cryptology - CRYPTO \u201989, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings, volume 435 of Lecture Notes in Computer Science, pages 416\u2013427. Springer, 1989.","DOI":"10.1007\/0-387-34805-0_39"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"C.\u00a0Dobraunig, M.\u00a0Eichlseder, and F.\u00a0Mendel. Analysis of SHA-512\/224 and SHA-512\/256. In T.\u00a0Iwata and J.\u00a0H. Cheon, editors, Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part II, volume 9453 of Lecture Notes in Computer Science, pages 612\u2013630. Springer, 2015.","DOI":"10.1007\/978-3-662-48800-3_25"},{"key":"8_CR5","unstructured":"F.\u00a0Draft. Public comments on the draft federal information processing standard (fips) draft fips 180-2, secure hash standard (shs)."},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"O.\u00a0Dunkelman, N.\u00a0Keller, E.\u00a0Ronen, and A.\u00a0Shamir. The retracing boomerang attack. In A.\u00a0Canteaut and Y.\u00a0Ishai, editors, Advances in Cryptology - EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part I, volume 12105 of Lecture Notes in Computer Science, pages 280\u2013309. Springer, 2020.","DOI":"10.1007\/978-3-030-45721-1_11"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"M.\u00a0Eichlseder, F.\u00a0Mendel, and M.\u00a0Schl\u00e4ffer. Branching heuristics in differential collision search with applications to SHA-512. In C.\u00a0Cid and C.\u00a0Rechberger, editors, Fast Software Encryption - 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers, volume 8540 of Lecture Notes in Computer Science, pages 473\u2013488. Springer, 2014.","DOI":"10.1007\/978-3-662-46706-0_24"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"L.\u00a0Grassi, C.\u00a0Rechberger, and S.\u00a0R\u00f8njom. A new structural-differential property of 5-round AES. In J.\u00a0Coron and J.\u00a0B. Nielsen, editors, Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part II, volume 10211 of Lecture Notes in Computer Science, pages 289\u2013317, 2017.","DOI":"10.1007\/978-3-319-56614-6_10"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"S.\u00a0Indesteege, F.\u00a0Mendel, B.\u00a0Preneel, and C.\u00a0Rechberger. Collisions and other non-random properties for step-reduced SHA-256. In R.\u00a0M. Avanzi, L.\u00a0Keliher, and F.\u00a0Sica, editors, Selected Areas in Cryptography, 15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers, volume 5381 of Lecture Notes in Computer Science, pages 276\u2013293. Springer, 2008.","DOI":"10.1007\/978-3-642-04159-4_18"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"D.\u00a0Khovratovich, C.\u00a0Rechberger, and A.\u00a0Savelieva. Bicliques for preimages: Attacks on Skein-512 and the SHA-2 family. In A.\u00a0Canteaut, editor, Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers, volume 7549 of Lecture Notes in Computer Science, pages 244\u2013263. Springer, 2012.","DOI":"10.1007\/978-3-642-34047-5_15"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Y.\u00a0Li, F.\u00a0Liu, and G.\u00a0Wang. New records in collision attacks on SHA-2. In M.\u00a0Joye and G.\u00a0Leander, editors, Advances in Cryptology - EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part I, volume 14651 of Lecture Notes in Computer Science, pages 158\u2013186. Springer, 2024.","DOI":"10.1007\/978-3-031-58716-0_6"},{"issue":"3","key":"8_CR12","doi-asserted-by":"publisher","first-page":"152","DOI":"10.46586\/tosc.v2022.i3.152-190","volume":"2022","author":"F Liu","year":"2022","unstructured":"F.\u00a0Liu, W.\u00a0Meier, S.\u00a0Sarkar, G.\u00a0Wang, R.\u00a0Ito, and T.\u00a0Isobe. New cryptanalysis of ZUC-256 initialization using modular differences. IACR Trans. Symmetric Cryptol., 2022(3):152\u2013190, 2022.","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"F.\u00a0Liu, G.\u00a0Wang, S.\u00a0Sarkar, R.\u00a0Anand, W.\u00a0Meier, Y.\u00a0Li, and T.\u00a0Isobe. Analysis of RIPEMD-160: new collision attacks and finding characteristics with MILP. In C.\u00a0Hazay and M.\u00a0Stam, editors, Advances in Cryptology - EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part IV, volume 14007 of Lecture Notes in Computer Science, pages 189\u2013219. Springer, 2023.","DOI":"10.1007\/978-3-031-30634-1_7"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"F.\u00a0Mendel, T.\u00a0Nad, and M.\u00a0Schl\u00e4ffer. Finding SHA-2 characteristics: Searching through a minefield of contradictions. In D.\u00a0H. Lee and X.\u00a0Wang, editors, Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings, volume 7073 of Lecture Notes in Computer Science, pages 288\u2013307. Springer, 2011.","DOI":"10.1007\/978-3-642-25385-0_16"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"F.\u00a0Mendel, T.\u00a0Nad, and M.\u00a0Schl\u00e4ffer. Improving local collisions: New attacks on reduced SHA-256. In T.\u00a0Johansson and P.\u00a0Q. Nguyen, editors, Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings, volume 7881 of Lecture Notes in Computer Science, pages 262\u2013278. Springer, 2013.","DOI":"10.1007\/978-3-642-38348-9_16"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"R.\u00a0C. Merkle. One way hash functions and DES. In G.\u00a0Brassard, editor, Advances in Cryptology - CRYPTO \u201989, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings, volume 435 of Lecture Notes in Computer Science, pages 428\u2013446. Springer, 1989.","DOI":"10.1007\/0-387-34805-0_40"},{"key":"8_CR17","unstructured":"X.\u00a0Wang, X.\u00a0Lai, D.\u00a0Feng, H.\u00a0Chen, and X.\u00a0Yu. Cryptanalysis of the hash functions MD4 and RIPEMD. In R.\u00a0Cramer, editor, Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings, volume 3494 of Lecture Notes in Computer Science, pages 1\u201318. Springer, 2005."},{"key":"8_CR18","unstructured":"X.\u00a0Wang, Y.\u00a0L. Yin, and H.\u00a0Yu. Finding collisions in the full SHA-1. In V.\u00a0Shoup, editor, Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings, volume 3621 of Lecture Notes in Computer Science, pages 17\u201336. Springer, 2005."},{"key":"8_CR19","unstructured":"X.\u00a0Wang and H.\u00a0Yu. How to break MD5 and other hash functions. In R.\u00a0Cramer, editor, Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings, volume 3494 of Lecture Notes in Computer Science, pages 19\u201335. Springer, 2005."},{"key":"8_CR20","unstructured":"X.\u00a0Wang, H.\u00a0Yu, and Y.\u00a0L. Yin. Efficient collision search attacks on SHA-0. In V.\u00a0Shoup, editor, Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings, volume 3621 of Lecture Notes in Computer Science, pages 1\u201316. Springer, 2005."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0941-3_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,8]],"date-time":"2024-12-08T14:02:37Z","timestamp":1733666557000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0941-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,9]]},"ISBN":["9789819609406","9789819609413"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0941-3_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,9]]},"assertion":[{"value":"9 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asiacrypt.iacr.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}