Improving generic attacks using exceptional functions
From MaRDI portal
Publication:6652911
DOI10.1007/978-3-031-68385-5_4MaRDI QIDQ6652911
Rachelle Heim Boissier, André Schrottenloher, Gaëtan Leurent, Xavier Bonnetain
Publication date: 13 December 2024
Quantum computation (81P68) Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- On the complexity of the herding attack and some related attacks on hash functions
- Functional graph revisited: updates on (second) preimage attacks on hash combiners
- Full-state keyed duplex with built-in multi-user support
- \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing
- Generic attacks on hash combiners
- New Attacks on the Concatenation and XOR Hash Combiners
- Memory-Efficient Algorithms for Finding Needles in Haystacks
- New Generic Attacks against Hash-Based MACs
- Updates on Generic Attacks against HMAC and NMAC
- Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications
- The Sum Can Be Weaker Than Each Part
- Herding Hash Functions and the Nostradamus Attack
- Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård
- Time/Space Trade-Offs for Reversible Computation
- Fast Software Encryption Functions
- Algorithmic Cryptanalysis
- Advances in Cryptology – CRYPTO 2004
- Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work
- Generic Universal Forgery Attack on Iterative Hash-Based MACs
- Constructing an Ideal Hash Function from Weak Ideal Compression Functions
- Probability Distributions Related to Random Mappings
- Quantum cryptanalysis of hash and claw-free functions
- Generic attack on duplex-based AEAD modes using random function statistics
- Finding many collisions via reusable quantum walks. Application to lattice sieving
- Nostradamus goes quantum
- Quantum attacks on hash constructions with low quantum random access memory
This page was built for publication: Improving generic attacks using exceptional functions