Rotational Cryptanalysis of Round-Reduced Keccak
From MaRDI portal
Publication:2946881
DOI10.1007/978-3-662-43933-3_13zbMath1321.94081OpenAlexW2171549701WikidataQ59484955 ScholiaQ59484955MaRDI QIDQ2946881
Josef Pieprzyk, Paweł Morawiecki, Marian Srebrny
Publication date: 18 September 2015
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-43933-3_13
Related Items (18)
New Results on the SymSum Distinguisher on Round-Reduced SHA3 ⋮ The design of keyed hash function based on CNN-MD structure ⋮ Cryptanalysis of round-reduced KECCAK using non-linear structures ⋮ Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials ⋮ MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes ⋮ Rotational differential-linear cryptanalysis revisited ⋮ Meet-in-the-middle preimage attacks on sponge-based hashing ⋮ Rotational differential-linear distinguishers of ARX ciphers with arbitrary output linear masks ⋮ Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak ⋮ Exploring SAT for cryptanalysis: (quantum) collision attacks against 6-round SHA-3 ⋮ Cryptographic Applications of the Duplex Construction ⋮ Rotational cryptanalysis on MAC algorithm chaskey ⋮ On the Multi-output Filtering Model and Its Applications ⋮ Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC ⋮ Rotational rebound attacks on reduced Skein ⋮ Cryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\) ⋮ Rotational cryptanalysis from a differential-linear perspective. Practical distinguishers for round-reduced \texttt{FRIET}, \texttt{Xoodoo}, and \texttt{Alzette} ⋮ Preimage attacks on 4-round Keccak by solving multivariate quadratic systems
Cites Work
- Unnamed Item
- A note on an inequality involving the normal distribution
- Rotational Rebound Attacks on Reduced Skein
- Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256
- Practical Analysis of Reduced-Round Keccak
- SEA: A Scalable Encryption Algorithm for Small Embedded Applications
- Rotational Cryptanalysis of ARX
- Unaligned Rebound Attack: Application to Keccak
- New Attacks on Keccak-224 and Keccak-256
- Keccak
This page was built for publication: Rotational Cryptanalysis of Round-Reduced Keccak