Rotational rebound attacks on reduced Skein
From MaRDI portal
Publication:744348
DOI10.1007/s00145-013-9150-0zbMath1302.94053OpenAlexW1965262782MaRDI QIDQ744348
Dmitry Khovratovich, Christian Rechberger, Ivica Nikolić
Publication date: 25 September 2014
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://lirias.kuleuven.be/handle/123456789/280784
compression functionhash functiondistinguishercipherrebound attackSHA-3rotational cryptanalysisSkein
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Construction of Differential Characteristics in ARX Designs Application to Skein
- Improved Analysis of ECHO-256
- Boomerang Attacks on Hash Function Using Auxiliary Differentials
- Rotational Cryptanalysis of Round-Reduced Keccak
- Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256
- Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes
- Rotational Rebound Attacks on Reduced Skein
- Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE
- Cryptanalysis of Luffa v2 Components
- Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions
- Biclique Cryptanalysis of the Full AES
- Distinguisher and Related-Key Attack on the Full AES-256
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- SEA: A Scalable Encryption Algorithm for Small Embedded Applications
- Collisions for Step-Reduced SHA-256
- Rotational Cryptanalysis of ARX
- Hash Functions and the (Amplified) Boomerang Attack
- Analysis of Step-Reduced SHA-256
- Collisions and Other Non-random Properties for Step-Reduced SHA-256
- Rebound Attack on the Full Lane Compression Function
- Rebound Distinguishers: Results on the Full Whirlpool Compression Function
- Improved Cryptanalysis of Skein
- Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher
- Improved Rebound Attack on the Finalist Grøstl
- Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family
- Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2
- Unaligned Rebound Attack: Application to Keccak
- Bicliques for Permutations: Collision and Preimage Attacks in Stronger Settings
- Keccak
- Advances in Cryptology – CRYPTO 2004
- How to Break MD5 and Other Hash Functions
- Collisions of SHA-0 and Reduced SHA-1
- Finding Collisions in the Full SHA-1
- Improved Collision Search for SHA-0
- Topics in Cryptology – CT-RSA 2005
This page was built for publication: Rotational rebound attacks on reduced Skein