Algebraic Attacks on Round-Reduced Keccak
From MaRDI portal
Publication:6488379
DOI10.1007/978-3-030-90567-5_5zbMath1522.94071MaRDI QIDQ6488379
Unnamed Author, Takanori Isobe, Willi Meier, Fukang Liu
Publication date: 13 April 2023
Related Items (1)
Cites Work
- Non-full Sbox linearization: applications to collision attacks on round-reduced \textsc{keccak}
- New MILP modeling: improved conditional cube attacks on KECCAK-based constructions
- Cryptanalysis of 2 round \textsc{Keccak}-384
- Cryptanalysis of round-reduced KECCAK using non-linear structures
- Preimage attacks on round-reduced Keccak-224/256 via an allocating approach
- Practical collision attacks against round-reduced SHA-3
- Improved conditional cube attacks on Keccak keyed modes with MILP method
- MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes
- Rotational Cryptanalysis of Round-Reduced Keccak
- Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function
- Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak
- New Attacks on Keccak-224 and Keccak-256
- Keccak
- New Collision Attacks on Round-Reduced Keccak
- How to Break MD5 and Other Hash Functions
- Finding Collisions in the Full SHA-1
- On the Indifferentiability of the Sponge Construction
- Conditional Cube Attack on Reduced-Round Keccak Sponge Function
This page was built for publication: Algebraic Attacks on Round-Reduced Keccak