Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials
From MaRDI portal
Publication:2946880
DOI10.1007/978-3-662-43933-3_12zbMath1321.94054OpenAlexW2162996307MaRDI QIDQ2946880
Adi Shamir, Orr Dunkelman, Itai Dinur
Publication date: 18 September 2015
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-43933-3_12
Related Items (13)
LHash: A Lightweight Hash Function ⋮ Cryptanalysis of round-reduced KECCAK using non-linear structures ⋮ Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials ⋮ MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes ⋮ Meet-in-the-middle preimage attacks on sponge-based hashing ⋮ Collision attacks on round-reduced SHA-3 using conditional internal differentials ⋮ Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak ⋮ Exploring SAT for cryptanalysis: (quantum) collision attacks against 6-round SHA-3 ⋮ Cryptographic Applications of the Duplex Construction ⋮ On the Multi-output Filtering Model and Its Applications ⋮ Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC ⋮ Practical collision attacks against round-reduced SHA-3 ⋮ New Collision Attacks on Round-Reduced Keccak
Cites Work
- Unnamed Item
- Unnamed Item
- New types of cryptanalytic attacks using related keys
- Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials
- Rotational Cryptanalysis of Round-Reduced Keccak
- Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256
- Practical Analysis of Reduced-Round Keccak
- Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude
- Another Look at Complementation Properties
- Improved Differential Attacks for ECHO and Grøstl
- Partitioning cryptanalysis
- Unaligned Rebound Attack: Application to Keccak
- Differential Propagation Analysis of Keccak
- New Attacks on Keccak-224 and Keccak-256
- A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
- Advanced Encryption Standard – AES
- On the Indifferentiability of the Sponge Construction
This page was built for publication: Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials