Boomerang Attacks on BLAKE-32
From MaRDI portal
Publication:3013086
DOI10.1007/978-3-642-21702-9_13zbMath1307.94037OpenAlexW6911803MaRDI QIDQ3013086
Arnab Roy, Ivica Nikolić, Alex Biryukov
Publication date: 7 July 2011
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-21702-9_13
Related Items
Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVAL ⋮ Boomerang Attacks on Hash Function Using Auxiliary Differentials ⋮ Boomerang Attack on Step-Reduced SHA-512 ⋮ Boomerang and Slide-Rotational Analysis of the SM3 Hash Function ⋮ Survey on recent trends towards generalized differential and boomerang uniformities ⋮ Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160 ⋮ Second order collision for the 42-step reduced DHA-256 hash function ⋮ Evolution of fairness in the one-shot anonymous Ultimatum Game ⋮ An observation on NORX, BLAKE2, and ChaCha ⋮ Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA ⋮ Boomerang Distinguisher for the SIMD-512 Compression Function ⋮ Automatic verification of differential characteristics: application to reduced Gimli
Uses Software
Cites Work