Rebound Attack on the Full Lane Compression Function
From MaRDI portal
Publication:3650688
DOI10.1007/978-3-642-10366-7_7zbMath1267.94083OpenAlexW1574947811MaRDI QIDQ3650688
Ivica Nikolić, Yu Sasaki, María Naya-Plasencia, Martin Schläffer, Krystian Matusiewicz
Publication date: 15 December 2009
Published in: Advances in Cryptology – ASIACRYPT 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-10366-7_7
Related Items (17)
Improved Analysis of ECHO-256 ⋮ LHash: A Lightweight Hash Function ⋮ Cryptanalysis of the Round-Reduced GOST Hash Function ⋮ New second-preimage attacks on hash functions ⋮ Whirlwind: a new cryptographic hash function ⋮ Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes ⋮ Triangulating rebound attack on AES-like hashing ⋮ A New Algorithm for the Unbalanced Meet-in-the-Middle Problem ⋮ \texttt{Horst} meets \textit{Fluid}-SPN: Griffin for zero-knowledge applications ⋮ Improved cryptanalysis of AES-like permutations ⋮ Analysis of Reduced-SHAvite-3-256 v2 ⋮ Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function ⋮ Rotational rebound attacks on reduced Skein ⋮ Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function ⋮ Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ ⋮ Experimental Verification of Super-Sbox Analysis — Confirmation of Detailed Attack Complexity ⋮ The rebound attack and subspace distinguishers: application to Whirlpool
Uses Software
This page was built for publication: Rebound Attack on the Full Lane Compression Function