Collision attacks on round-reduced SHA-3 using conditional internal differentials
From MaRDI portal
Publication:6083130
DOI10.1007/978-3-031-30634-1_8zbMath1528.94088OpenAlexW4365807666MaRDI QIDQ6083130
Zhongyi Zhang, Meicheng Liu, Chengan Hou
Publication date: 8 December 2023
Published in: Advances in Cryptology – EUROCRYPT 2023 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-30634-1_8
Cites Work
- Improved practical attacks on round-reduced Keccak
- Probability to meet in the middle
- Non-full Sbox linearization: applications to collision attacks on round-reduced \textsc{keccak}
- Preimage attacks on round-reduced Keccak-224/256 via an allocating approach
- Practical collision attacks against round-reduced SHA-3
- Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials
- Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak
- Improved Differential Attacks for ECHO and Grøstl
- New Attacks on Keccak-224 and Keccak-256
- Keccak
- New Collision Attacks on Round-Reduced Keccak
- Exploring SAT for cryptanalysis: (quantum) collision attacks against 6-round SHA-3
This page was built for publication: Collision attacks on round-reduced SHA-3 using conditional internal differentials