New Collision Attacks on Round-Reduced Keccak
From MaRDI portal
Publication:5270363
DOI10.1007/978-3-319-56617-7_8zbMath1415.94457OpenAlexW2594885244MaRDI QIDQ5270363
Meicheng Liu, Ling Song, Kexin Qiao, Jian Guo
Publication date: 23 June 2017
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-56617-7_8
Related Items (6)
Cryptanalysis of full LowMC and LowMC-M with algebraic techniques ⋮ MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes ⋮ Collision attacks on round-reduced SHA-3 using conditional internal differentials ⋮ Exploring SAT for cryptanalysis: (quantum) collision attacks against 6-round SHA-3 ⋮ Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC ⋮ Practical collision attacks against round-reduced SHA-3
Uses Software
Cites Work
- Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19--21, 2012. Revised selected papers
- Improved practical attacks on round-reduced Keccak
- Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials
- Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak- $$f$$ f Permutation
- Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function
- Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions
- Practical Analysis of Reduced-Round Keccak
- Unaligned Rebound Attack: Application to Keccak
- Differential Propagation Analysis of Keccak
- New Attacks on Keccak-224 and Keccak-256
- Keccak
- On the Indifferentiability of the Sponge Construction
This page was built for publication: New Collision Attacks on Round-Reduced Keccak