Cryptanalysis of GOST R hash function (Q402352): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
Created claim: DBLP publication ID (P1635): journals/ipl/WangYW14, #quickstatements; #temporary_batch_1731483406851
 
(7 intermediate revisions by 7 users not shown)
Property / Mathematics Subject Classification ID
 
Property / Mathematics Subject Classification ID: 94A60 / rank
 
Normal rank
Property / zbMATH DE Number
 
Property / zbMATH DE Number: 6335091 / rank
 
Normal rank
Property / zbMATH Keywords
 
cryptography
Property / zbMATH Keywords: cryptography / rank
 
Normal rank
Property / zbMATH Keywords
 
hash function
Property / zbMATH Keywords: hash function / rank
 
Normal rank
Property / zbMATH Keywords
 
GOST R
Property / zbMATH Keywords: GOST R / rank
 
Normal rank
Property / zbMATH Keywords
 
rebound attack
Property / zbMATH Keywords: rebound attack / rank
 
Normal rank
Property / zbMATH Keywords
 
multi-collision
Property / zbMATH Keywords: multi-collision / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: Whirlpool / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.ipl.2014.07.007 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2130420945 / rank
 
Normal rank
Property / Wikidata QID
 
Property / Wikidata QID: Q57383102 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Break MD5 and Other Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Finding Collisions in the Full SHA-1 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl / rank
 
Normal rank
Property / cites work
 
Property / cites work: Rebound Distinguishers: Results on the Full Whirlpool Compression Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Single-Key Attacks on 8-Round AES-192 and AES-256 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Rotational Rebound Attacks on Reduced Skein / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unaligned Rebound Attack: Application to Keccak / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Linear-XOR and Additive Checksums Don’t Protect Damgård-Merkle Hashes from Generic Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Rebound Attacks on Stribog / rank
 
Normal rank
Property / DBLP publication ID
 
Property / DBLP publication ID: journals/ipl/WangYW14 / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 08:40, 13 November 2024

scientific article
Language Label Description Also known as
English
Cryptanalysis of GOST R hash function
scientific article

    Statements

    Cryptanalysis of GOST R hash function (English)
    0 references
    0 references
    0 references
    0 references
    28 August 2014
    0 references
    cryptography
    0 references
    hash function
    0 references
    GOST R
    0 references
    rebound attack
    0 references
    multi-collision
    0 references

    Identifiers