Rebound Distinguishers: Results on the Full Whirlpool Compression Function
From MaRDI portal
Publication:3650689
DOI10.1007/978-3-642-10366-7_8zbMath1267.94079OpenAlexW2136320902MaRDI QIDQ3650689
Florian Mendel, Martin Schläffer, Christian Rechberger, Mario Lamberger, Vincent Rijmen
Publication date: 15 December 2009
Published in: Advances in Cryptology – ASIACRYPT 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-10366-7_8
Related Items (36)
Improved Analysis of ECHO-256 ⋮ Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks ⋮ LHash: A Lightweight Hash Function ⋮ Cryptanalysis of the Round-Reduced GOST Hash Function ⋮ Practical Free-Start Collision Attacks on 76-step SHA-1 ⋮ Whirlwind: a new cryptographic hash function ⋮ Cryptanalysis of Reduced-Round Whirlwind ⋮ Cryptanalysis of Round-Reduced $$\mathtt{LED}$$ ⋮ Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256 ⋮ Cryptanalysis of GOST R hash function ⋮ Improved attacks against reduced-round Whirlwind ⋮ Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes ⋮ Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing ⋮ Triangulating rebound attack on AES-like hashing ⋮ Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials ⋮ Collision attack on \({\mathtt Grindahl}\) ⋮ \texttt{Horst} meets \textit{Fluid}-SPN: Griffin for zero-knowledge applications ⋮ Quantum collision attacks on AES-like hashing with low quantum random access memories ⋮ Internal differential collision attacks on the reduced-round Grøstl-0 hash function ⋮ Improved cryptanalysis of AES-like permutations ⋮ Analysis of the Kupyna-256 Hash Function ⋮ StriBob: аутентифицированное шифрование с помощью подстановки LPS из ГОСТ Р 34.11-2012 ⋮ The NIST SHA-3 Competition: A Perspective on the Final Year ⋮ Analysis of Reduced-SHAvite-3-256 v2 ⋮ Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function ⋮ Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool ⋮ Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes ⋮ Statistical integral distinguisher with multi-structure and its application on AES-like ciphers ⋮ Distinguisher on full-round compression function of GOST R ⋮ Rotational rebound attacks on reduced Skein ⋮ Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function ⋮ Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ ⋮ Cryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-2 ⋮ Experimental Verification of Super-Sbox Analysis — Confirmation of Detailed Attack Complexity ⋮ The rebound attack and subspace distinguishers: application to Whirlpool ⋮ Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound
Uses Software
This page was built for publication: Rebound Distinguishers: Results on the Full Whirlpool Compression Function