Improved cryptanalysis of AES-like permutations (Q484330): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Changed an Item
ReferenceBot (talk | contribs)
Changed an Item
 
(3 intermediate revisions by 3 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s00145-013-9156-7 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W1977329611 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Higher-Order Differential Properties of Keccak and Luffa / rank
 
Normal rank
Property / cites work
 
Property / cites work: The PHOTON Family of Lightweight Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Differential Attacks for ECHO and Grøstl / rank
 
Normal rank
Property / cites work
 
Property / cites work: Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: The LED Block Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Analysis of ECHO-256 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Rebound Attack on the Finalist Grøstl / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4484885 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Rebound Distinguishers: Results on the Full Whirlpool Compression Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- ASIACRYPT 2009. 15th international conference on the theory and application of cryptology and information security, Tokyo, Japan, December 6--10, 2009. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Rebound Attack on the Full Lane Compression Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl / rank
 
Normal rank
Property / cites work
 
Property / cites work: Rebound Attacks on the Reduced Grøstl Hash Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Improve Rebound Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Known and Chosen Key Differential Distinguishers for Block Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of Grindahl / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Break MD5 and Other Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Finding Collisions in the Full SHA-1 / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 12:26, 9 July 2024

scientific article
Language Label Description Also known as
English
Improved cryptanalysis of AES-like permutations
scientific article

    Statements

    Improved cryptanalysis of AES-like permutations (English)
    0 references
    0 references
    0 references
    0 references
    7 January 2015
    0 references
    0 references
    cryptanalysis
    0 references
    hash function
    0 references
    AES
    0 references
    SHA-3
    0 references
    Grøstl
    0 references
    rebound attack
    0 references
    0 references
    0 references
    0 references