Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function
From MaRDI portal
Publication:3084267
DOI10.1007/978-3-642-19574-7_25zbMath1293.94094OpenAlexW1521748375MaRDI QIDQ3084267
Publication date: 15 March 2011
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19574-7_25
cryptanalysishash functionsrebound attacknear-collisionscollision attackSHA-3 competitionECHOsubspace distinguishertruncated differential path
Related Items (3)
Improved Analysis of ECHO-256 ⋮ Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ ⋮ The rebound attack and subspace distinguishers: application to Whirlpool
Cites Work
- Unnamed Item
- Unnamed Item
- Advances in cryptology -- ASIACRYPT 2009. 15th international conference on the theory and application of cryptology and information security, Tokyo, Japan, December 6--10, 2009. Proceedings
- The rebound attack and subspace distinguishers: application to Whirlpool
- Cryptanalysis of Luffa v2 Components
- Distinguisher and Related-Key Attack on the Full AES-256
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- Understanding Two-Round Differentials in AES
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- Improved Differential Attacks for ECHO and Grøstl
- Rebound Attack on the Full Lane Compression Function
- Rebound Distinguishers: Results on the Full Whirlpool Compression Function
- Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher
- The Wide Trail Design Strategy
- Rebound Attacks on the Reduced Grøstl Hash Function
This page was built for publication: Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function