Quantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions
From MaRDI portal
Publication:2107924
DOI10.1007/s11128-022-03499-5OpenAlexW4224942278MaRDI QIDQ2107924
Seung Jun Baek, Jongsung Kim, Sehee Cho
Publication date: 5 December 2022
Published in: Quantum Information Processing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11128-022-03499-5
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- MJH: a faster alternative to MDC-2
- Parallel collision search with cryptanalytic applications
- An efficient quantum collision search algorithm and implications on symmetric cryptography
- Low-communication parallel quantum multi-target preimage search
- On quantum related-key attacks on iterated Even-Mansour ciphers
- Analysis of the single-permutation encrypted Davies-Meyer construction
- Classical vs quantum random oracles
- Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound
- Quantum collision attacks on reduced SHA-256 and SHA-512
- Quantum collision attacks on AES-like hashing with low quantum random access memories
- The Collision Security of MDC-4
- Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
- MJH: A Faster Alternative to MDC-2
- Random Oracles in a Quantum World
- Distinguisher and Related-Key Attack on the Full AES-256
- Some Plausible Constructions of Double-Block-Length Hash Functions
- Speeding up Collision Search for Byte-Oriented Hash Functions
- Security of Cyclic Double Block Length Hash Functions
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- On the (In)Security of IDEA in Various Hashing Modes
- The Collision Security of Tandem-DM in the Ideal Cipher Model
- How to Break MD5 and Other Hash Functions
- The Collision Intractability of MDC-2 in the Ideal-Cipher Model
- Finding Collisions in the Full SHA-1
- Quantum cryptanalysis of hash and claw-free functions
This page was built for publication: Quantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions