Cryptanalysis of Grindahl
From MaRDI portal
Publication:3498399
DOI10.1007/978-3-540-76900-2_34zbMath1153.94423OpenAlexW1902962512MaRDI QIDQ3498399
Publication date: 15 May 2008
Published in: Advances in Cryptology – ASIACRYPT 2007 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-76900-2_34
Related Items (13)
Cryptanalysis of Reduced-Round Whirlwind ⋮ Collision attack on \({\mathtt Grindahl}\) ⋮ The Hash Function Family LAKE ⋮ Internal differential collision attacks on the reduced-round Grøstl-0 hash function ⋮ Improved Impossible Differential Attacks on Large-Block Rijndael ⋮ Improved cryptanalysis of AES-like permutations ⋮ Analysis of Reduced-SHAvite-3-256 v2 ⋮ Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function ⋮ Slide Attacks on a Class of Hash Functions ⋮ Speeding up Collision Search for Byte-Oriented Hash Functions ⋮ Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques ⋮ Two Attacks on RadioGatún ⋮ The rebound attack and subspace distinguishers: application to Whirlpool
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Cryptanalysis of FORK-256
- The Grindahl Hash Functions
- Security Analysis of Constructions Combining FIL Random Oracles
- VSH, an Efficient and Provable Collision-Resistant Hash Function
- Herding Hash Functions and the Nostradamus Attack
- On Building Hash Functions from Multivariate Quadratic Equations
- Breaking the ICE – Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions
- A New Dedicated 256-Bit Hash Function: FORK-256
- Some Plausible Constructions of Double-Block-Length Hash Functions
- Advances in Cryptology – CRYPTO 2004
- Cryptanalysis of the Hash Functions MD4 and RIPEMD
- How to Break MD5 and Other Hash Functions
- Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work
- Efficient Collision Search Attacks on SHA-0
- Finding Collisions in the Full SHA-1
- Finding SHA-1 Characteristics: General Results and Applications
- Multi-Property-Preserving Hash Domain Extension and the EMD Transform
- Combining Compression Functions and Block Cipher-Based Hash Functions
- Progress in Cryptology – Mycrypt 2005
- One Way Hash Functions and DES
This page was built for publication: Cryptanalysis of Grindahl