Skein Hash
From MaRDI portal
Software:32296
No author found.
Related Items (34)
Boomerang Attacks on Hash Function Using Auxiliary Differentials ⋮ Feistel-inspired scrambling improves the quality of linear congruential generators ⋮ Extracts from the SHA-3 Competition ⋮ The Boomerang Attacks on the Round-Reduced Skein-512 ⋮ Provable Security of BLAKE with Non-ideal Compression Function ⋮ Tweaking Even-Mansour Ciphers ⋮ New second-preimage attacks on hash functions ⋮ Differential property of \textsc{Present}-like structure ⋮ Open problems in hash function security ⋮ A measure of dependence for cryptographic primitives relative to ideal functions ⋮ Improved generic attacks against hash-based MACs and HAIFA ⋮ The DBlock family of block ciphers ⋮ How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers ⋮ Introducing the counter mode of operation to compressed sensing based encryption ⋮ Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher ⋮ Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC ⋮ McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes ⋮ Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK ⋮ Collisions of MMO-MD5 and Their Impact on Original MD5 ⋮ On the Security of Hash Functions Employing Blockcipher Postprocessing ⋮ The Additive Differential Probability of ARX ⋮ \textsc{POEx}: a beyond-birthday-bound-secure on-line cipher ⋮ Expedient Non-malleability Notions for Hash Functions ⋮ Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model ⋮ Rotational rebound attacks on reduced Skein ⋮ Вероятностные характеристики разностных и линейных соотношений для неоднородной линейной среды ⋮ Разностные характеристики основных операций ARX-шифров ⋮ The Differential Analysis of S-Functions ⋮ Authenticated Encryption with Small Stretch (or, How to Accelerate AERO) ⋮ Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA ⋮ Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey ⋮ Building Blockcipher from Tweakable Blockcipher: Extending FSE 2009 Proposal ⋮ Lightweight Implementations of SHA-3 Candidates on FPGAs ⋮ Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
This page was built for software: Skein Hash