Parallel collision search with cryptanalytic applications

From MaRDI portal
Revision as of 11:31, 31 January 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:1284011

DOI10.1007/PL00003816zbMath0992.94028DBLPjournals/joc/OorschotW99OpenAlexW2008272678WikidataQ56388136 ScholiaQ56388136MaRDI QIDQ1284011

Michael J. Wiener, Paul C. van Oorschot

Publication date: 22 September 2002

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/pl00003816






Related Items (only showing first 100 items - show all)

Improved attacks against reduced-round WhirlwindEfficient detection of high probability statistical properties of cryptosystems via surrogate differentiationFinding many collisions via reusable quantum walks. Application to lattice sievingM-SIDH and MD-SIDH: countering SIDH attacks by masking informationTriangulating rebound attack on AES-like hashingFinding low-weight polynomial multiples using the rho methodCombining Montgomery multiplication with tag tracing for the Pollard rho algorithm in prime order fieldsCryptanalysis of an oblivious PRF from supersingular isogeniesAutomatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentialsParallel isogeny path finding with limited memoryParallel optimization over the integer efficient setEfficient isogeny proofs using generic techniquesLow memory attacks on small key CSIDHExploring SIDH-based signature parametersNew SIDH countermeasures for a more efficient key exchangeMemory-efficient attacks on small LWE keysMemory-efficient attacks on small LWE keysRevisiting meet-in-the-middle cryptanalysis of SIDH/SIKE with application to the \$IKEp182 challengeAn algorithm for efficient detection of \((N, N)\)-splittings and its application to the isogeny problem in dimension 2Generic MitM attack frameworks on sponge constructionsIs ML-based cryptanalysis inherently limited? Simulating cryptographic adversaries via gradient-based methodsNew algorithm for the elliptic curve discrete logarithm problem with auxiliary inputsSoK: how (not) to design and implement post-quantum cryptographyImprovements to RSA key generation and CRT on embedded devicesOn the cost of ASIC hardware crackers: a SHA-1 case studyAnother Look at TightnessImproving ECDLP Computation in Characteristic 2Reducing the Key Size of Rainbow Using Non-commutative RingsThe Supersingular Isogeny Problem in Genus 2 and BeyondHow to meet ternary LWE keysCryptanalysis of full LowMC and LowMC-M with algebraic techniquesThe cost to break SIKE: a comparative hardware-based analysis with AES and SHA-3On index calculus algorithms for subfield curvesLow-gate quantum golden collision findingNot enough less: an improved algorithm for solving code equivalence problems over \(\mathbb{F}_q\)Provable time-memory trade-offs: symmetric cryptography against memory-bounded adversariesNonlinearities in elliptic curve authenticationA SAT-Based Approach for Index Calculus on Binary Elliptic CurvesKey-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DESImproved Information Set Decoding for Code-Based Cryptosystems with Constrained MemoryAll Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle ApproachA new approach for finding low-weight polynomial multiplesA new adaptive attack on SIDHCycle detection using a stackImplementation of point-counting algorithms on genus 2 hyperelliptic curves based on the birthday paradoxPoint counting on Picard curves in large characteristicAnalysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite DegreeImproved algorithm for the isogeny problem for ordinary elliptic curvesOn the Isogeny Problem with Torsion Point InformationComputing elliptic curve discrete logarithms with improved baby-step giant-step algorithmUsing Random Error Correcting Codes in Near-Collision Attacks on Generic Hash-FunctionsTime-Memory Trade-Offs for Near-CollisionsA variant of the Galbraith-Ruprai algorithm for discrete logarithms with improved complexitySymmetric Hadamard matrices of order 116 and 172 existGeneric attacks on hash combinersCryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problemScalable zero knowledge via cycles of elliptic curvesImproved generic attacks against hash-based MACs and HAIFAAn efficient collision detection method for computing discrete logarithms with Pollard's rhoA New Algorithm for the Unbalanced Meet-in-the-Middle ProblemUnnamed ItemSpeeding up elliptic curve discrete logarithm computations with point halvingNew second preimage attacks on dithered hash functions with low memory complexityComputing discrete logarithms with the parallelized kangaroo method.B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsionOblivious pseudorandom functions from isogeniesAccelerating Pollard's rho algorithm on finite fieldsRecent progress on the elliptic curve discrete logarithm problemReduced memory meet-in-the-middle attack against the NTRU private keyImproved Pollard rho method for computing discrete logarithms over finite extension fieldsOn random walks for Pollard's rho methodComputing elliptic curve discrete logarithms with the negation mapFault-based attack on Montgomery's ladder algorithmOn the cost of computing isogenies between supersingular elliptic curvesMemoryless near-collisions via coding theoryA low-memory algorithm for finding short product representations in finite groups.New results on quasi-subfield polynomialsАнализ сложности алгоритма параллельного поиска “золотой” коллизииComputational hardness of IFP and ECDLPComputing low-weight discrete logarithmsNTRU prime: reducing attack surface at low costComputing discrete logarithms in an intervalTime-space complexity of quantum search algorithms in symmetric cryptanalysis: applying to AES and SHA-2Cycle detection algorithms and their applicationsAn algorithmic framework for the generalized birthday problemA birthday paradox for Markov chains with an optimal bound for collision in the Pollard rho algorithm for discrete logarithmA low-memory algorithm for point counting on Picard curvesCryptanalysis of MD2A taxonomy of pairing-friendly elliptic curvesHerding Hash Functions and the Nostradamus AttackKeyed/Unkeyed RIPEMD-128, 192, 256The parallelized Pollard kangaroo method in real quadratic function fieldsSpeeding Up the Pollard Rho Method on Prime FieldsCryptographic implications of Hess' generalized GHS attackWeil sum for birthday attack in multivariate quadratic cryptosystemAlgebraic approaches for solving isogeny problems of prime power degreesSolving the multi-discrete logarithm problems over a group of elliptic curves with prime orderFaster Space-Efficient Algorithms for Subset Sum, $k$-Sum, and Related ProblemsResearch on attacking a special elliptic curve discrete logarithm problemIndex calculus for abelian varieties of small dimension and the elliptic curve discrete logarithm problem







This page was built for publication: Parallel collision search with cryptanalytic applications