Mathematical Research Data Initiative
Main page
Recent changes
Random page
Help about MediaWiki
Create a new Item
Create a new Property
Create a new EntitySchema
Merge two items
In other projects
Discussion
View source
View history
Purge
English
Log in

Non-full Sbox linearization: applications to collision attacks on round-reduced \textsc{keccak}

From MaRDI portal
Publication:1680222
Jump to:navigation, search

DOI10.1007/978-3-319-63715-0_15zbMath1410.94108OpenAlexW2725050237MaRDI QIDQ1680222

Jian Guo, Ling Song, Guohong Liao

Publication date: 15 November 2017

Full work available at URL: https://doi.org/10.1007/978-3-319-63715-0_15


zbMATH Keywords

collisionhash functionadaptiveKeccaknon-full linearizationsha-3


Mathematics Subject Classification ID

Cryptography (94A60)


Related Items (8)

Quantum algorithm for Boolean equation solving and quantum algebraic attack on cryptosystems ⋮ Cryptanalysis of full LowMC and LowMC-M with algebraic techniques ⋮ Cryptanalysis of round-reduced KECCAK using non-linear structures ⋮ MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes ⋮ Collision attacks on round-reduced SHA-3 using conditional internal differentials ⋮ Exploring SAT for cryptanalysis: (quantum) collision attacks against 6-round SHA-3 ⋮ Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC ⋮ Practical collision attacks against round-reduced SHA-3




This page was built for publication: Non-full Sbox linearization: applications to collision attacks on round-reduced \textsc{keccak}

Retrieved from "https://portal.mardi4nfdi.de/w/index.php?title=Publication:1680222&oldid=13995038"
Tools
What links here
Related changes
Special pages
Printable version
Permanent link
Page information
MaRDI portal item
This page was last edited on 1 February 2024, at 06:17.
Privacy policy
About MaRDI portal
Disclaimers
Imprint
Powered by MediaWiki