{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T08:18:56Z","timestamp":1770970736073,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T00:00:00Z","timestamp":1766448000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T00:00:00Z","timestamp":1766448000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Heilongjiang Graduate Excellence Funding Program","award":["LJYXL2024-025"],"award-info":[{"award-number":["LJYXL2024-025"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62271234"],"award-info":[{"award-number":["62271234"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Open Foundation of State key Laboratory of Networking and Switching Technology","award":["SKLNST-2024-1-04"],"award-info":[{"award-number":["SKLNST-2024-1-04"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-025-05024-w","type":"journal-article","created":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T06:09:14Z","timestamp":1766470154000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Quantum collision attacks on reduced SHA-256."],"prefix":"10.1007","volume":"25","author":[{"given":"Bao-Min","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Hong-Wei","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Xue","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ke-Jia","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Long","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,23]]},"reference":[{"key":"5024_CR1","first-page":"183","volume":"180","author":"P Gallagher","year":"1995","unstructured":"Gallagher, P., Director, A.: Secure hash standard (shs). FIPS PUB 180, 183 (1995)","journal-title":"FIPS PUB"},{"key":"5024_CR2","unstructured":"Leurent, G., Peyrin, T.: SHA-1 is a shambles: first chosen-prefix collision on SHA-1 and application to the PGP web of trust. In: Capkun, S., Roesner, F. USENIX Security. pp. 1839-1856 (2020)"},{"key":"5024_CR3","doi-asserted-by":"crossref","unstructured":"Mendel, F., Pramstaller, N., Rechberger, C., et al.: Analysis of step-reduced SHA-256. In: Fast Software Encryption: 13th International Workshop. pp. 126-143, (2006)","DOI":"10.1007\/11799313_9"},{"key":"5024_CR4","doi-asserted-by":"crossref","unstructured":"Nikolic, I., Biryukov, A.: Collisions for step reduced SHA-256. In: Fast Software Encryption: 15th International Workshop. pp. 1-15, (2008)","DOI":"10.1007\/978-3-540-71039-4_1"},{"key":"5024_CR5","doi-asserted-by":"crossref","unstructured":"Indesteege, S., Mendel, F., Preneel, B., et al.: Collisions and other non-random properties for step reduced SHA-256.In: International Workshop on Selected Areas in Cryptography, pp. 276-293, (2008)","DOI":"10.1007\/978-3-642-04159-4_18"},{"key":"5024_CR6","doi-asserted-by":"crossref","unstructured":"Sanadhya, S.K., Sarkar, P.: New collision attacks against up to 24-step SHA-2. In: Progress in Cryptology-INDOCRYPT 2008: 9th International Conference on Cryptology in India. pp. 91-103, (2008)","DOI":"10.1007\/978-3-540-89754-5_8"},{"key":"5024_CR7","doi-asserted-by":"crossref","unstructured":"Mendel, F., Nad, T., Schlaffer, M.: Finding SHA-2 characteristics: searching through a minefield of contradictions. In: Advances in Cryptology-ASIACRYPT 2011: 17th International Conference on the Theory and Application of Cryptology and Information Security. pp. 288-307, (2011)","DOI":"10.1007\/978-3-642-25385-0_16"},{"key":"5024_CR8","doi-asserted-by":"crossref","unstructured":"Mendel, F., Nad, T., Schlaffer, M.: Improving local collisions: new attacks on reduced SHA-256. In: Advances in Cryptology-EUROCRYPT 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques. pp. 262-278, (2013)","DOI":"10.1007\/978-3-642-38348-9_16"},{"key":"5024_CR9","doi-asserted-by":"crossref","unstructured":"Eichlseder, M., Mendel, F., Schlaffer, M.: Branching heuristics in differential collision search with applications to SHA-512. In: International Workshop on Fast Software Encryption. pp. 473-488, (2014)","DOI":"10.1007\/978-3-662-46706-0_24"},{"key":"5024_CR10","doi-asserted-by":"crossref","unstructured":"Dobraunig, C., Eichlseder, M., Mendel, F.: Analysis of SHA-512\/224 and SHA-512\/256. In: Advances in Cryptology-ASIACRYPT 2015: 21st International Conference on the Theory and Application of Cryptology and Information Security. pp. 612-630, (2015)","DOI":"10.1007\/978-3-662-48800-3_25"},{"key":"5024_CR11","doi-asserted-by":"crossref","unstructured":"Hosoyamada, A, Sasaki, Y.: Quantum collision attacks on reduced SHA-256 and SHA-512. In: Annual International Cryptology Conference. pp. 727-757, (2021)","DOI":"10.1007\/978-3-030-84242-0_22"},{"key":"5024_CR12","doi-asserted-by":"crossref","unstructured":"Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of computing. pp. 212-219, (1996)","DOI":"10.1145\/237814.237866"},{"key":"5024_CR13","doi-asserted-by":"crossref","unstructured":"Hosoyamada, A, Sasaki, Y.: Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound. In: Advances in Cryptology- EUROCRYPT 2020: 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques. pp. 249-279, (2020)","DOI":"10.1007\/978-3-030-45724-2_9"},{"key":"5024_CR14","doi-asserted-by":"crossref","unstructured":"Dong, X.Y., Sun, S.W., Shi, D.P., et al.: Quantum collision attacks on AES-like hashing with low quantum random access memories. In: Advances in Cryptology-ASIACRYPT 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security. 616-646 (2020)","DOI":"10.1007\/978-3-030-64834-3_25"},{"key":"5024_CR15","doi-asserted-by":"crossref","unstructured":"Guo, J., Liu, G., Song, L., et al.: Exploring SAT for cryptanalysis:quantum collision attacks against 6-round SHA-3. In: International Conference on the Theory and Application of Cryptology and Information Security. pp. 645-674, (2022)","DOI":"10.1007\/978-3-031-22969-5_22"},{"issue":"11","key":"5024_CR16","doi-asserted-by":"publisher","DOI":"10.1088\/1402-4896\/acfc79","volume":"98","author":"J Duan","year":"2023","unstructured":"Duan, J., Li, M., Ian, H.: A quantum algorithm for finding collision-inducing disturbance vectors in SHA-1. Phys. Scr. 98(11), 115106 (2023)","journal-title":"Phys. Scr."},{"key":"5024_CR17","doi-asserted-by":"crossref","unstructured":"Jang, K., Lim, S., Oh, Y., et al.: Quantum implementation and analysis of SHA-2 and SHA-3. IEEE Transactions on Emerging Topics in Computing (2025)","DOI":"10.1109\/TETC.2025.3546648"},{"key":"5024_CR18","first-page":"158","volume-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"Y Li","year":"2024","unstructured":"Li, Y., Liu, F., Wang, G.: New records in collision attacks on SHA-2. In: Joye, M., Leander, G. (eds.) Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 158\u2013186. Springer Nature Switzerland, Cham (2024)"},{"key":"5024_CR19","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1090\/conm\/305\/05215","volume":"305","author":"G Brassard","year":"2002","unstructured":"Brassard, G., Hoyer, P., Mosca, M., et al.: Quantum amplitude amplification and estimation. Contemp. Math. 305, 53\u201374 (2002)","journal-title":"Contemp. Math."},{"key":"5024_CR20","first-page":"264","volume-title":"FSE. Lecture Notes in Computer Science","author":"J Li","year":"2012","unstructured":"Li, J., Isobe, T., Shibutani, K.: Converting meet-in-the-middle preimage attack into pseudo collision attack: application to SHA-2. In: Canteaut, A. (ed.) FSE. Lecture Notes in Computer Science, pp. 264\u2013286. Springer, Berlin Heidelberg (2012)"},{"key":"5024_CR21","unstructured":"Ttas, K.O.: Hash function standard part 2: hash function algorithm standard (HAS-160). TTAS.KO-12.0011\/R1 (2008)"},{"key":"5024_CR22","doi-asserted-by":"crossref","unstructured":"Mendel, F., Nad, T., Schlffer, M.: Cryptanalysis of round-reduced HAS-160. In: Information Security and Cryptology-ICISC 2011: 14th International Conference. pp. 33-47, (2011)","DOI":"10.1007\/978-3-642-31912-9_3"},{"key":"5024_CR23","doi-asserted-by":"crossref","unstructured":"Liu, F.K., Dobraunig, C., Mendel, F., et al.: New semi-free-start collision attack framework for reduced RIPEMD-160. IACR Transactions on Symmetric Cryptology, pp. 169-192, (2019)","DOI":"10.46586\/tosc.v2019.i3.169-192"},{"key":"5024_CR24","doi-asserted-by":"crossref","unstructured":"Karpman, P, Peyrin, T., Stevens, M.: Practical free-start collision attacks on 76-step SHA-1. In: Annual Cryptology Conference. pp. 623-642, (2015)","DOI":"10.1007\/978-3-662-47989-6_30"},{"issue":"4","key":"5024_CR25","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/s00145-021-09413-z","volume":"34","author":"A Florez-Gutierrez","year":"2021","unstructured":"Florez-Gutierrez, A., Leurent, G., Naya-Plasencia, M., et al.: Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on Gimli. J. Cryptol. 34(4), 45 (2021)","journal-title":"J. Cryptol."},{"key":"5024_CR26","doi-asserted-by":"crossref","unstructured":"Nageler, M., Pallua, F., Eichlseder, M.: Finding collisions for round-reduced Romulus-H. In: IACR Transactions on Symmetric Cryptology, pp. 67-88, (2023)","DOI":"10.46586\/tosc.v2023.i1.67-88"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-025-05024-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-025-05024-w","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-025-05024-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T07:25:44Z","timestamp":1770967544000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-025-05024-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,23]]},"references-count":26,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,1]]}},"alternative-id":["5024"],"URL":"https:\/\/doi.org\/10.1007\/s11128-025-05024-w","relation":{},"ISSN":["1573-1332"],"issn-type":[{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,23]]},"assertion":[{"value":"17 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"2"}}