Forgery Attacks on Round-Reduced ICEPOLE-128
From MaRDI portal
Publication:2807228
DOI10.1007/978-3-319-31301-6_27zbMath1396.94072OpenAlexW2402446753MaRDI QIDQ2807228
Florian Mendel, Maria Eichlseder, Christoph Dobraunig
Publication date: 19 May 2016
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-31301-6_27
Cites Work
- Differential cryptanalysis of DES-like cryptosystems
- Differential Cryptanalysis of SipHash
- Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications
- Branching Heuristics in Differential Collision Search with Applications to SHA-512
- Differential-Linear Cryptanalysis of ICEPOLE
- Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions
- Improving Local Collisions: New Attacks on Reduced SHA-256
- NORX: Parallel and Scalable AEAD
- ICEPOLE: High-Speed, Hardware-Oriented Authenticated Encryption
- On the Indifferentiability of the Sponge Construction
- Finding SHA-1 Characteristics: General Results and Applications
This page was built for publication: Forgery Attacks on Round-Reduced ICEPOLE-128