Differential Propagation Analysis of Keccak
From MaRDI portal
Publication:4899718
DOI10.1007/978-3-642-34047-5_24zbMath1312.94041OpenAlexW156355313MaRDI QIDQ4899718
Gilles Van Assche, Joan Daemen
Publication date: 8 January 2013
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-34047-5_24
Related Items (11)
Analysis of NORX: Investigating Differential and Rotational Properties ⋮ Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials ⋮ A Framework for Automated Independent-Biclique Cryptanalysis ⋮ MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes ⋮ Exploring SAT for cryptanalysis: (quantum) collision attacks against 6-round SHA-3 ⋮ On the security of keyed hashing based on public permutations ⋮ Conditional cube attack on round-reduced River Keyak ⋮ On the Multi-output Filtering Model and Its Applications ⋮ Improved practical attacks on round-reduced Keccak ⋮ Practical collision attacks against round-reduced SHA-3 ⋮ New Collision Attacks on Round-Reduced Keccak
This page was built for publication: Differential Propagation Analysis of Keccak