The rebound attack and subspace distinguishers: application to Whirlpool (Q2344049): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
Property / cites work
 
Property / cites work: Cryptanalysis of Grindahl / rank
 
Normal rank
Property / cites work
 
Property / cites work: Differential cryptanalysis of DES-like cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Distinguisher and Related-Key Attack on the Full AES-256 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Biclique Cryptanalysis of the Full AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automatic Search of Attacks on Round-Reduced AES and Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249321 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Wide Trail Design Strategy / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2760977 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3212279 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Collisions for 70-Step SHA-1: On the Full Cost of Collision Search / rank
 
Normal rank
Property / cites work
 
Property / cites work: Finding SHA-1 Characteristics: General Results and Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Faster Chosen-Key Distinguishers on Reduced-Round AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of MD4 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unaligned Rebound Attack: Application to Keccak / rank
 
Normal rank
Property / cites work
 
Property / cites work: Matrices over a Finite Field / rank
 
Normal rank
Property / cites work
 
Property / cites work: Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of the Tiger Hash Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Collision Attacks on the Reduced-Round Grøstl Hash Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Rebound Attack on the Finalist Grøstl / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Analysis of ECHO-256 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Collisions and Near-Collisions for Reduced-Round Tiger / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of Luffa v2 Components / rank
 
Normal rank
Property / cites work
 
Property / cites work: Rotational Rebound Attacks on Reduced Skein / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4484885 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Finding Collisions in the Full SHA-1 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Known-Key Distinguishers for Some Block Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Rebound Distinguishers: Results on the Full Whirlpool Compression Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Construction of Differential Characteristics in ARX Designs Application to Skein / rank
 
Normal rank
Property / cites work
 
Property / cites work: Rebound Attack on the Full Lane Compression Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Update on Tiger / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl / rank
 
Normal rank
Property / cites work
 
Property / cites work: Rebound Attacks on the Reduced Grøstl Hash Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: One Way Hash Functions and DES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Analysis of Reduced-SHAvite-3-256 v2 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Improve Rebound Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Rebound Attack on JH42 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4484897 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Differential Attacks for ECHO and Grøstl / rank
 
Normal rank
Property / cites work
 
Property / cites work: Rebound Attack on Reduced-Round Versions of JH / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Remark on Stirling's Formula / rank
 
Normal rank
Property / cites work
 
Property / cites work: Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl / rank
 
Normal rank
Property / cites work
 
Property / cites work: Experimental Verification of Super-Sbox Analysis — Confirmation of Detailed Attack Complexity / rank
 
Normal rank
Property / cites work
 
Property / cites work: Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941810 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Break MD5 and Other Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of the LANE Hash Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256 / rank
 
Normal rank

Revision as of 02:23, 10 July 2024

scientific article
Language Label Description Also known as
English
The rebound attack and subspace distinguishers: application to Whirlpool
scientific article

    Statements

    The rebound attack and subspace distinguishers: application to Whirlpool (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    12 May 2015
    0 references
    hash functions
    0 references
    cryptanalysis
    0 references
    near-collision
    0 references
    distinguisher
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers