Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak
From MaRDI portal
Publication:2958122
DOI10.1007/978-3-662-53887-6_9zbMath1404.94078OpenAlexW2550770775MaRDI QIDQ2958122
Ling Song, Jian Guo, Meicheng Liu
Publication date: 1 February 2017
Published in: Advances in Cryptology – ASIACRYPT 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53887-6_9
Related Items (14)
Cryptanalysis of full LowMC and LowMC-M with algebraic techniques ⋮ New Results on the SymSum Distinguisher on Round-Reduced SHA3 ⋮ Cryptanalysis of round-reduced KECCAK using non-linear structures ⋮ MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes ⋮ Meet-in-the-middle preimage attacks on sponge-based hashing ⋮ Collision attacks on round-reduced SHA-3 using conditional internal differentials ⋮ Allocating rotational cryptanalysis-based preimage attack on 4-round \textsc{Keccak}-224 for quantum setting ⋮ Exploring SAT for cryptanalysis: (quantum) collision attacks against 6-round SHA-3 ⋮ Algebraic attacks on Rasta and Dasta using low-degree equations ⋮ Conditional cube attack on round-reduced River Keyak ⋮ Practical collision attacks against round-reduced SHA-3 ⋮ Cryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\) ⋮ The inverse of \(\chi\) and its applications to Rasta-like ciphers ⋮ Preimage attacks on 4-round Keccak by solving multivariate quadratic systems
Uses Software
Cites Work
- A SAT-based preimage analysis of reduced \textsc{Keccak} hash functions
- Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19--21, 2012. Revised selected papers
- Improved practical attacks on round-reduced Keccak
- Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials
- Rotational Cryptanalysis of Round-Reduced Keccak
- Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak- $$f$$ f Permutation
- Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function
- Higher-Order Differential Properties of Keccak and Luffa
- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
- Practical Analysis of Reduced-Round Keccak
- Preimages for Step-Reduced SHA-2
- Unaligned Rebound Attack: Application to Keccak
- New Attacks on Keccak-224 and Keccak-256
- Keccak
- On the Indifferentiability of the Sponge Construction
This page was built for publication: Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak