Pages that link to "Item:Q3013095"
From MaRDI portal
The following pages link to Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool (Q3013095):
Displaying 18 items.
- An improved preimage attack against \texttt{HAVAL-3} (Q477698) (← links)
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing (Q2056714) (← links)
- Cryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-2 (Q2056728) (← links)
- Quantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions (Q2107924) (← links)
- Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound (Q2119014) (← links)
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks (Q2129000) (← links)
- The rebound attack and subspace distinguishers: application to Whirlpool (Q2344049) (← links)
- Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD (Q2637303) (← links)
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS (Q2829213) (← links)
- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 (Q3058649) (← links)
- Cryptanalysis of Reduced-Round Whirlwind (Q3194587) (← links)
- A Meet-in-the-Middle Attack on 8-Round AES (Q3525664) (← links)
- Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others (Q3634495) (← links)
- Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2 (Q4899710) (← links)
- Triangulating rebound attack on AES-like hashing (Q6097258) (← links)
- Automated meet-in-the-middle attack goes to Feistel (Q6595820) (← links)
- Diving deep into the preimage security of AES-like hashing (Q6636399) (← links)
- Generic MitM attack frameworks on sponge constructions (Q6652908) (← links)