Practical collision attacks against round-reduced SHA-3
From MaRDI portal
Publication:2303457
DOI10.1007/s00145-019-09313-3zbMath1455.94160OpenAlexW2914643373MaRDI QIDQ2303457
Guozhen Liu, Kexin Qiao, Jian Guo, Ling Song, Guohong Liao, Meicheng Liu
Publication date: 3 March 2020
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://hdl.handle.net/10356/100424
Related Items (5)
LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4 ⋮ Collision attacks on round-reduced SHA-3 using conditional internal differentials ⋮ Constructing keyed hash algorithm using enhanced chaotic map with varying parameter ⋮ Exploring SAT for cryptanalysis: (quantum) collision attacks against 6-round SHA-3 ⋮ An algebraic attack on ciphers with low-degree round functions: application to full MiMC
Uses Software
Cites Work
- Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19--21, 2012. Revised selected papers
- Improved practical attacks on round-reduced Keccak
- Non-full Sbox linearization: applications to collision attacks on round-reduced \textsc{keccak}
- Differential Cryptanalysis of Keccak Variants
- Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials
- Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak- $$f$$ f Permutation
- Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function
- Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak
- Practical Analysis of Reduced-Round Keccak
- Unaligned Rebound Attack: Application to Keccak
- Differential Propagation Analysis of Keccak
- New Attacks on Keccak-224 and Keccak-256
- Keccak
- New Collision Attacks on Round-Reduced Keccak
This page was built for publication: Practical collision attacks against round-reduced SHA-3