Unaligned Rebound Attack: Application to Keccak
From MaRDI portal
Publication:4899717
DOI10.1007/978-3-642-34047-5_23zbMath1312.94046OpenAlexW1754198554MaRDI QIDQ4899717
Jian Guo, Lei Wei, Alexandre Duc, Thomas Peyrin
Publication date: 8 January 2013
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-34047-5_23
Related Items (16)
New Results on the SymSum Distinguisher on Round-Reduced SHA3 ⋮ Cryptanalysis of round-reduced KECCAK using non-linear structures ⋮ Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials ⋮ Rotational Cryptanalysis of Round-Reduced Keccak ⋮ MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes ⋮ Cryptanalysis of GOST R hash function ⋮ Triangulating rebound attack on AES-like hashing ⋮ Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak ⋮ Conditional Cube Attack on Reduced-Round Keccak Sponge Function ⋮ On the Multi-output Filtering Model and Its Applications ⋮ Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC ⋮ Rotational rebound attacks on reduced Skein ⋮ Improved practical attacks on round-reduced Keccak ⋮ Practical collision attacks against round-reduced SHA-3 ⋮ The rebound attack and subspace distinguishers: application to Whirlpool ⋮ New Collision Attacks on Round-Reduced Keccak
This page was built for publication: Unaligned Rebound Attack: Application to Keccak