The Boomerang Attacks on the Round-Reduced Skein-512
From MaRDI portal
Publication:3455506
DOI10.1007/978-3-642-35999-6_19zbMath1327.94080OpenAlexW571925191MaRDI QIDQ3455506
Xiaoyun Wang, Jiazhe Chen, Hongbo Yu
Publication date: 4 December 2015
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-35999-6_19
Related Items (2)
Boomerang Attack on Step-Reduced SHA-512 ⋮ Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256
Uses Software
Cites Work
- Boomerang Attacks on Hash Function Using Auxiliary Differentials
- Rotational Rebound Attacks on Reduced Skein
- Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE
- Second-Order Differential Collisions for Reduced SHA-256
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- Rotational Cryptanalysis of ARX
- Improved Cryptanalysis of Skein
- Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family
- Rebound Attacks on the Reduced Grøstl Hash Function
- How to Break MD5 and Other Hash Functions
- Related-Key Boomerang and Rectangle Attacks
This page was built for publication: The Boomerang Attacks on the Round-Reduced Skein-512