TIDAL: practical collisions on state-reduced \textsc{Keccak} variants
From MaRDI portal
Publication:6535080
DOI10.1007/978-3-031-33488-7_8zbMATH Open1542.94141MaRDI QIDQ6535080
Sahiba Suryawanshi, Shashwat Jaiswal, Dhiman Saha
Publication date: 9 November 2023
Cites Work
- Non-full Sbox linearization: applications to collision attacks on round-reduced \textsc{keccak}
- Practical collision attacks against round-reduced SHA-3
- Differential Cryptanalysis of Keccak Variants
- Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications
- Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials
- Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak- $$f$$ f Permutation
- Practical Analysis of Reduced-Round Keccak
- Improved Differential Attacks for ECHO and Grøstl
- New Attacks on Keccak-224 and Keccak-256
- Practical Distinguishers against 6-Round Keccak-f Exploiting Self-Symmetry
- New Results on the SymSum Distinguisher on Round-Reduced SHA3
- New Collision Attacks on Round-Reduced Keccak
This page was built for publication: TIDAL: practical collisions on state-reduced \textsc{Keccak} variants
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6535080)