Diving deep into the preimage security of AES-like hashing
From MaRDI portal
Publication:6636399
DOI10.1007/978-3-031-58716-0_14MaRDI QIDQ6636399
Danping Shi, Jian Guo, Eik List, Tianyu Zhang, Shiyao Chen
Publication date: 12 November 2024
AESmeet-in-the-middle attackstreebogwhirlpooldistributed initial structuresrijndaelS-box linearizationstructural similiarities
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Improved (pseudo) preimage attacks on reduced-round \texttt{GOST} and \texttt{Grøstl-256} and studies on several truncation patterns for \texttt{AES}-like compression functions
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
- Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
- The rebound attack and subspace distinguishers: application to Whirlpool
- Sieve-in-the-Middle: Improved MITM Attacks
- Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers
- Match Box Meet-in-the-Middle Attack Against KATAN
- Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- Preimage Attacks on 3, 4, and 5-Pass HAVAL
- Finding Preimages in Full MD5 Faster Than Exhaustive Search
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- Rebound Distinguishers: Results on the Full Whirlpool Compression Function
- Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family
- Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks
- Preimage Attacks on Reduced-Round Stribog
- Meet-in-the-middle preimage attacks on sponge-based hashing
- Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing
- Simplified MITM modeling for permutations: new (quantum) attacks
- Algebraic attacks on round-reduced \textsc{Rain} and full \textsf{AIM-III}
- Automated meet-in-the-middle attack goes to Feistel
This page was built for publication: Diving deep into the preimage security of AES-like hashing
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6636399)