Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ
From MaRDI portal
Publication:2817820
DOI10.1007/978-3-319-40367-0_19zbMath1346.94090OpenAlexW2492045039MaRDI QIDQ2817820
Florian Mendel, Nasour Bagheri, Yu Sasaki
Publication date: 2 September 2016
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-40367-0_19
Related Items
Cites Work
- Unnamed Item
- The rebound attack and subspace distinguishers: application to Whirlpool
- Higher-Order Cryptanalysis of LowMC
- Limited-Birthday Distinguishers for Hash Functions
- Improved Analysis of ECHO-256
- Multiple Limited-Birthday Distinguishers and Applications
- Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
- Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl
- Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function
- Experimental Verification of Super-Sbox Analysis — Confirmation of Detailed Attack Complexity
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- PAEQ: Parallelizable Permutation-Based Authenticated Encryption
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- Improved Differential Attacks for ECHO and Grøstl
- Rebound Attack on the Full Lane Compression Function
- Rebound Distinguishers: Results on the Full Whirlpool Compression Function
- Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher
- Improved Rebound Attack on the Finalist Grøstl
- Rebound Attacks on the Reduced Grøstl Hash Function