The following pages link to Whirlpool (Q25254):
Displayed 45 items.
- A structure-based chaotic hashing scheme (Q327795) (← links)
- Cryptanalysis of GOST R hash function (Q402352) (← links)
- Open problems in hash function security (Q887443) (← links)
- On the distance from permutations to the union of all imprimitive groups with identical parameters of imprimitivity systems. (Q892613) (← links)
- Rotation symmetry in algebraically generated cryptographic substitution tables (Q963378) (← links)
- Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound (Q2119014) (← links)
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks (Q2129000) (← links)
- The rebound attack and subspace distinguishers: application to Whirlpool (Q2344049) (← links)
- Security of permutation-based compression function {\textsf{lp}}231 (Q2446596) (← links)
- Aperiodic propagation criteria for Boolean functions (Q2495652) (← links)
- Whirlwind: a new cryptographic hash function (Q2638401) (← links)
- Construction of Lightweight S-Boxes Using Feistel and MISTY Structures (Q2807223) (← links)
- Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1 (Q2820490) (← links)
- SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks (Q2900625) (← links)
- Practical Attacks on AES-like Cryptographic Hash Functions (Q2946479) (← links)
- Structural Evaluation by Generalized Integral Property (Q2948332) (← links)
- Collisions of MMO-MD5 and Their Impact on Original MD5 (Q3011908) (← links)
- Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool (Q3013095) (← links)
- Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes (Q3013096) (← links)
- On the Diffusion of Generalized Feistel Structures Regarding Differential and Linear Cryptanalysis (Q3084256) (← links)
- Experimental Verification of Super-Sbox Analysis — Confirmation of Detailed Attack Complexity (Q3098004) (← links)
- Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC (Q3190016) (← links)
- Cryptanalysis of Reduced-Round Whirlwind (Q3194587) (← links)
- The Whirlpool Secure Hash Function (Q3452643) (← links)
- On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure (Q3457107) (← links)
- How (Not) to Efficiently Dither Blockcipher-Based Hash Functions? (Q3506390) (← links)
- (Q3509824) (← links)
- Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation (Q3525672) (← links)
- New Applications of Differential Bounds of the SDS Structure (Q3540157) (← links)
- On Feistel Structures Using a Diffusion Switching Mechanism (Q3618643) (← links)
- The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function (Q3618663) (← links)
- Rebound Attack on the Full Lane Compression Function (Q3650688) (← links)
- Rebound Distinguishers: Results on the Full Whirlpool Compression Function (Q3650689) (← links)
- (Q4434867) (← links)
- (Q4737242) (← links)
- Construction, Randomness and Security of New Hash Functions Derived from Chaos Mappings (Q4911232) (← links)
- Interpreting Hash Function Security Proofs (Q4933215) (← links)
- Construction of MDS matrices combining the Feistel, Misty and Lai-Massey schemes (Q5071462) (← links)
- StriBob: аутентифицированное шифрование с помощью подстановки LPS из ГОСТ Р 34.11-2012 (Q5152391) (← links)
- The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition (Q5189437) (← links)
- A Bit-Slice Implementation of the Whirlpool Hash Function (Q5385966) (← links)
- On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds (Q5465806) (← links)
- Hash Functions and RFID Tags: Mind the Gap (Q5502785) (← links)
- On the Impossibility of Efficiently Combining Collision Resistant Hash Functions (Q5756644) (← links)
- Building indifferentiable compression functions from the PGV compression functions (Q5963372) (← links)