Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Skein Hash - MaRDI portal

Skein Hash

From MaRDI portal
Software:32296



swMATH20478MaRDI QIDQ32296


No author found.





Related Items (34)

Boomerang Attacks on Hash Function Using Auxiliary DifferentialsFeistel-inspired scrambling improves the quality of linear congruential generatorsExtracts from the SHA-3 CompetitionThe Boomerang Attacks on the Round-Reduced Skein-512Provable Security of BLAKE with Non-ideal Compression FunctionTweaking Even-Mansour CiphersNew second-preimage attacks on hash functionsDifferential property of \textsc{Present}-like structureOpen problems in hash function securityA measure of dependence for cryptographic primitives relative to ideal functionsImproved generic attacks against hash-based MACs and HAIFAThe DBlock family of block ciphersHow to Build Fully Secure Tweakable Blockciphers from Classical BlockciphersIntroducing the counter mode of operation to compressed sensing based encryptionJust tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipherImpossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BCMcOE: A Family of Almost Foolproof On-Line Authenticated Encryption SchemesProposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECKCollisions of MMO-MD5 and Their Impact on Original MD5On the Security of Hash Functions Employing Blockcipher PostprocessingThe Additive Differential Probability of ARX\textsc{POEx}: a beyond-birthday-bound-secure on-line cipherExpedient Non-malleability Notions for Hash FunctionsTweaking a block cipher: multi-user beyond-birthday-bound security in the standard modelRotational rebound attacks on reduced SkeinВероятностные характеристики разностных и линейных соотношений для неоднородной линейной средыРазностные характеристики основных операций ARX-шифровThe Differential Analysis of S-FunctionsAuthenticated Encryption with Small Stretch (or, How to Accelerate AERO)Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEAAutomatic Search of Linear Trails in ARX with Applications to SPECK and ChaskeyBuilding Blockcipher from Tweakable Blockcipher: Extending FSE 2009 ProposalLightweight Implementations of SHA-3 Candidates on FPGAsCounter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers


This page was built for software: Skein Hash