The Hash Function Family LAKE
From MaRDI portal
Publication:3525660
DOI10.1007/978-3-540-71039-4_3zbMath1154.68379OpenAlexW1831862684MaRDI QIDQ3525660
Raphael C.-W. Phan, Willi Meier, Jean-Philippe Aumasson
Publication date: 18 September 2008
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-71039-4_3
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Theory of software (68N99)
Related Items (6)
Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE ⋮ Security analysis of randomize-hash-then-sign digital signatures ⋮ Collision attack on \({\mathtt Grindahl}\) ⋮ Collisions for Round-Reduced LAKE ⋮ Speeding up Collision Search for Byte-Oriented Hash Functions ⋮ Collisions for variants of the BLAKE hash function
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Advances in cryptology - CRYPTO '98. 18th annual international cryptology conference, Santa Barbara, CA, USA, August 23--27, 1998. Proceedings
- Advances in cryptology -- ASIACRYPT 2007. 13th international conference on the theory and application of cryptology and information security, Kuching, Malaysia, December 2-6, 2007. Proceedings
- Advances in cryptology -- ASIACRYPT 2006. 12th international conference on the theory and application of cryptology and information security, Shanghai, China, December 3--7, 2006. Proceedings
- Cryptanalysis of the Tiger Hash Function
- Cryptanalysis of Grindahl
- Collisions for Round-Reduced LAKE
- Cryptanalysis of FORK-256
- The Grindahl Hash Functions
- A New Dedicated 256-Bit Hash Function: FORK-256
- A cryptanalytic time-memory trade-off
- The Complexity of Finding Cycles in Periodic Functions
- RIPEMD-160: A strengthened version of RIPEMD
- Seven-Property-Preserving Iterated Hashing: ROX
- Breaking a New Hash Function Design Strategy Called SMASH
- A Failure-Friendly Design Principle for Hash Functions
- A Framework for Chosen IV Statistical Analysis of Stream Ciphers
- Finding SHA-1 Characteristics: General Results and Applications
- Multi-Property-Preserving Hash Domain Extension and the EMD Transform
- Fast Software Encryption
- Strengthening Digital Signatures Via Randomized Hashing
- Fast Software Encryption
This page was built for publication: The Hash Function Family LAKE