Cryptanalysis of round-reduced KECCAK using non-linear structures
From MaRDI portal
Publication:2179387
DOI10.1007/978-3-030-35423-7_9zbMath1456.94109OpenAlexW2970543938MaRDI QIDQ2179387
Publication date: 12 May 2020
Full work available at URL: https://doi.org/10.1007/978-3-030-35423-7_9
Related Items (3)
Meet-in-the-middle preimage attacks on sponge-based hashing ⋮ Exploring SAT for cryptanalysis: (quantum) collision attacks against 6-round SHA-3 ⋮ Preimage attacks on 4-round Keccak by solving multivariate quadratic systems
Cites Work
- A SAT-based preimage analysis of reduced \textsc{Keccak} hash functions
- Improved practical attacks on round-reduced Keccak
- Cryptanalysis of 1-round KECCAK
- Non-full Sbox linearization: applications to collision attacks on round-reduced \textsc{keccak}
- Cryptanalysis of 2 round \textsc{Keccak}-384
- Preimage attacks on round-reduced Keccak-224/256 via an allocating approach
- Differential Cryptanalysis of Keccak Variants
- Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials
- Rotational Cryptanalysis of Round-Reduced Keccak
- Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak- $$f$$ f Permutation
- Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak
- Higher-Order Differential Properties of Keccak and Luffa
- Practical Analysis of Reduced-Round Keccak
- Unaligned Rebound Attack: Application to Keccak
- New Attacks on Keccak-224 and Keccak-256
- Keccak
This page was built for publication: Cryptanalysis of round-reduced KECCAK using non-linear structures