Preimage attacks on 4-round Keccak by solving multivariate quadratic systems
From MaRDI portal
Publication:2104437
DOI10.1007/978-3-031-08896-4_10OpenAlexW3174062847MaRDI QIDQ2104437
Jue Hong, Chenhao Wu, Kai He, Ximing Fu, Congming Wei, Xiaoyun Wang, Xiaoyang Dong
Publication date: 7 December 2022
Full work available at URL: https://doi.org/10.1007/978-3-031-08896-4_10
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Computer security (68M25)
Uses Software
Cites Work
- A SAT-based preimage analysis of reduced \textsc{Keccak} hash functions
- Cryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\)
- Cryptanalysis of round-reduced KECCAK using non-linear structures
- Preimage attacks on round-reduced Keccak-224/256 via an allocating approach
- A crossbred algorithm for solving Boolean polynomial systems
- Rotational Cryptanalysis of Round-Reduced Keccak
- Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak
- Fast Exhaustive Search for Polynomial Systems in ${\mathbb{F}_2}$
- Beating Brute Force for Systems of Polynomial Equations over Finite Fields
- Cryptanalysis of the Hash Functions MD4 and RIPEMD
- How to Break MD5 and Other Hash Functions
- Efficient Collision Search Attacks on SHA-0
- Finding Collisions in the Full SHA-1
This page was built for publication: Preimage attacks on 4-round Keccak by solving multivariate quadratic systems