Rebound Distinguishers: Results on the Full Whirlpool Compression Function

From MaRDI portal
Publication:3650689

DOI10.1007/978-3-642-10366-7_8zbMath1267.94079OpenAlexW2136320902MaRDI QIDQ3650689

Florian Mendel, Martin Schläffer, Christian Rechberger, Mario Lamberger, Vincent Rijmen

Publication date: 15 December 2009

Published in: Advances in Cryptology – ASIACRYPT 2009 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-10366-7_8




Related Items (36)

Improved Analysis of ECHO-256Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacksLHash: A Lightweight Hash FunctionCryptanalysis of the Round-Reduced GOST Hash FunctionPractical Free-Start Collision Attacks on 76-step SHA-1Whirlwind: a new cryptographic hash functionCryptanalysis of Reduced-Round WhirlwindCryptanalysis of Round-Reduced $$\mathtt{LED}$$Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256Cryptanalysis of GOST R hash functionImproved attacks against reduced-round WhirlwindKnown-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modesSuperposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashingTriangulating rebound attack on AES-like hashingAutomatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentialsCollision attack on \({\mathtt Grindahl}\)\texttt{Horst} meets \textit{Fluid}-SPN: Griffin for zero-knowledge applicationsQuantum collision attacks on AES-like hashing with low quantum random access memoriesInternal differential collision attacks on the reduced-round Grøstl-0 hash functionImproved cryptanalysis of AES-like permutationsAnalysis of the Kupyna-256 Hash FunctionStriBob: аутентифицированное шифрование с помощью подстановки LPS из ГОСТ Р 34.11-2012The NIST SHA-3 Competition: A Perspective on the Final YearAnalysis of Reduced-SHAvite-3-256 v2Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression FunctionMeet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to WhirlpoolKnown-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing ModesStatistical integral distinguisher with multi-structure and its application on AES-like ciphersDistinguisher on full-round compression function of GOST RRotational rebound attacks on reduced SkeinSubspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash FunctionImproved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQCryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-2Experimental Verification of Super-Sbox Analysis — Confirmation of Detailed Attack ComplexityThe rebound attack and subspace distinguishers: application to WhirlpoolFinding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound


Uses Software



This page was built for publication: Rebound Distinguishers: Results on the Full Whirlpool Compression Function