Cryptanalysis of the Round-Reduced GOST Hash Function
From MaRDI portal
Publication:3454162
DOI10.1007/978-3-319-12087-4_20zbMath1347.94067OpenAlexW145806357MaRDI QIDQ3454162
Wenling Wu, Shuang Wu, Jian Zou
Publication date: 2 December 2015
Published in: Information Security and Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-12087-4_20
meet-in-the-middlemulti-collisionrebound attackGOSTcollision attackguess-and-determinepreimage attack
Related Items (4)
Streebog compression function as PRF in secret-key settings ⋮ Impossible Differential Properties of Reduced Round Streebog ⋮ Related-key attacks on the compression function of Streebog ⋮ Keyed Streebog is a secure PRF and MAC
Cites Work
- Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- A (Second) Preimage Attack on the GOST Hash Function
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- Cryptanalysis of the GOST Hash Function
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- Rebound Attack on the Full Lane Compression Function
- Rebound Distinguishers: Results on the Full Whirlpool Compression Function
- Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher
- Monte Carlo Methods for Index Computation (mod p)
- (Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others
- Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks
- Advances in Cryptology – CRYPTO 2004
- How to Break MD5 and Other Hash Functions
- Efficient Collision Search Attacks on SHA-0
- Finding Collisions in the Full SHA-1
This page was built for publication: Cryptanalysis of the Round-Reduced GOST Hash Function