Practical Analysis of Reduced-Round Keccak
From MaRDI portal
Publication:3104737
DOI10.1007/978-3-642-25578-6_18zbMath1291.94136OpenAlexW5981243MaRDI QIDQ3104737
Andrea Röck, María Naya-Plasencia, Willi Meier
Publication date: 16 December 2011
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-25578-6_18
Related Items
New Results on the SymSum Distinguisher on Round-Reduced SHA3 ⋮ Cryptanalysis of round-reduced KECCAK using non-linear structures ⋮ Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials ⋮ Rotational Cryptanalysis of Round-Reduced Keccak ⋮ A SAT-based preimage analysis of reduced \textsc{Keccak} hash functions ⋮ Meet-in-the-middle preimage attacks on sponge-based hashing ⋮ Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak ⋮ Exploring SAT for cryptanalysis: (quantum) collision attacks against 6-round SHA-3 ⋮ Cryptographic Applications of the Duplex Construction ⋮ Conditional Cube Attack on Reduced-Round Keccak Sponge Function ⋮ On the Multi-output Filtering Model and Its Applications ⋮ Improved practical attacks on round-reduced Keccak ⋮ Practical collision attacks against round-reduced SHA-3 ⋮ New Collision Attacks on Round-Reduced Keccak
Uses Software
Cites Work
- A SAT-based preimage analysis of reduced \textsc{Keccak} hash functions
- Higher-Order Differential Properties of Keccak and Luffa
- Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems
- Near-Collisions for the Reduced Round Versions of Some Second Round SHA-3 Compression Functions Using Hill Climbing
- Keccak
- How to Improve Rebound Attacks
- Advances in Cryptology – CRYPTO 2004
- How to Break MD5 and Other Hash Functions
- On Authentication with HMAC and Non-random Properties
- Finding Collisions in the Full SHA-1
- On the Indifferentiability of the Sponge Construction