Boomerang Attacks on Hash Function Using Auxiliary Differentials
From MaRDI portal
Publication:2890006
DOI10.1007/978-3-642-27954-6_14zbMath1292.94099OpenAlexW157125546MaRDI QIDQ2890006
Publication date: 8 June 2012
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-27954-6_14
zero-sumHash functionboomerang attackSkeinhigher order differentialchosen-keySHA-3 competitionThreefish
Related Items (7)
Boomerang Attack on Step-Reduced SHA-512 ⋮ The Boomerang Attacks on the Round-Reduced Skein-512 ⋮ Boomerang and Slide-Rotational Analysis of the SM3 Hash Function ⋮ Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256 ⋮ Second order collision for the 42-step reduced DHA-256 hash function ⋮ Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK ⋮ Rotational rebound attacks on reduced Skein
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Boomerang Attacks on BLAKE-32
- Rotational Rebound Attacks on Reduced Skein
- Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE
- Rotational Cryptanalysis of ARX
- Hash Functions and the (Amplified) Boomerang Attack
- Improved Cryptanalysis of Skein
- The Return of the Cryptographic Boomerang
- Related-Key Boomerang and Rectangle Attacks
This page was built for publication: Boomerang Attacks on Hash Function Using Auxiliary Differentials