Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher - MaRDI portal

Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher

From MaRDI portal
Publication:3651246

DOI10.1007/978-3-642-05445-7_2zbMath1267.94084OpenAlexW1899116689MaRDI QIDQ3651246

Martin Schläffer, Thomas Peyrin, Florian Mendel, Christian Rechberger

Publication date: 9 December 2009

Published in: Selected Areas in Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-05445-7_2




Related Items (23)

Cryptanalysis of the Round-Reduced GOST Hash FunctionCollision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis TechniquePractical Free-Start Collision Attacks on 76-step SHA-1New second-preimage attacks on hash functionsCryptanalysis of GOST R hash functionKnown-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modesTriangulating rebound attack on AES-like hashingCollision attack on \({\mathtt Grindahl}\)Internal differential collision attacks on the reduced-round Grøstl-0 hash functionImproved cryptanalysis of AES-like permutationsAnalysis of Reduced-SHAvite-3-256 v2Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression FunctionMeet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to WhirlpoolKnown-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing ModesStatistical integral distinguisher with multi-structure and its application on AES-like ciphersRotational rebound attacks on reduced SkeinSubspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash FunctionCryptanalysis of Luffa v2 ComponentsImproved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQExperimental Verification of Super-Sbox Analysis — Confirmation of Detailed Attack ComplexityBoomerang Distinguisher for the SIMD-512 Compression FunctionRevisiting Gilbert's known-key distinguisherThe rebound attack and subspace distinguishers: application to Whirlpool




This page was built for publication: Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher