Meet-in-the-middle preimage attacks on sponge-based hashing
From MaRDI portal
Publication:6083128
DOI10.1007/978-3-031-30634-1_6zbMath1528.94074OpenAlexW4365807512MaRDI QIDQ6083128
Xiaoyang Dong, Xiaoyun Wang, Jialiang Hua, Lingyue Qin, Hailun Yan
Publication date: 8 December 2023
Published in: Advances in Cryptology – EUROCRYPT 2023 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-30634-1_6
Cites Work
- Unnamed Item
- Unnamed Item
- Integer linear programming for three-subset meet-in-the-middle attacks: application to GIFT
- A single-key attack on the full GOST block cipher
- \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing
- Cryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\)
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
- Cryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-2
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
- Refined cryptanalysis of the GPRS ciphers GEA-1 and GEA-2
- Cryptanalysis of round-reduced KECCAK using non-linear structures
- Preimage attacks on round-reduced Keccak-224/256 via an allocating approach
- Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks
- Sieve-in-the-Middle: Improved MITM Attacks
- New Preimage Attacks against Reduced SHA-1
- Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems
- Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials
- Rotational Cryptanalysis of Round-Reduced Keccak
- Match Box Meet-in-the-Middle Attack Against KATAN
- Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE
- Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE
- Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak
- Breaking Grain-128 with Dynamic Cube Attacks
- Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
- Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems
- Improved Single-Key Attacks on 8-Round AES-192 and AES-256
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- Biclique Cryptanalysis of the Full AES
- Practical Analysis of Reduced-Round Keccak
- Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE
- A Meet-in-the-Middle Attack on 8-Round AES
- MD4 is Not One-Way
- Preimage Attacks on 3, 4, and 5-Pass HAVAL
- Finding Preimages in Full MD5 Faster Than Exhaustive Search
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
- Attacking Triple Encryption
- Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
- Automatic Search of Attacks on Round-Reduced AES and Applications
- How to Break MD5 and Other Hash Functions
- Finding Collisions in the Full SHA-1
- Improved Meet-in-the-Middle Attacks on Reduced-Round DES
- A Practical Attack on KeeLoq
- Conditional Cube Attack on Reduced-Round Keccak Sponge Function
- Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing
- Simplified MITM modeling for permutations: new (quantum) attacks
This page was built for publication: Meet-in-the-middle preimage attacks on sponge-based hashing