Cryptanalysis of GOST R hash function
From MaRDI portal
Recommendations
- Cryptanalysis of the Round-Reduced GOST Hash Function
- Cryptanalysis of the GOST Hash Function
- Improved cryptanalysis on reduced-round GOST and Whirlpool hash function
- The security of GOST R 34.11-2012 against preimage and collision attacks
- Some methods of hash functions analysis with application to the GOST P 34.11-94 algorithm
Cites work
- Advances in Cryptology – CRYPTO 2004
- Finding Collisions in the Full SHA-1
- How to Break MD5 and Other Hash Functions
- Improved cryptanalysis of the reduced Grøstl compression function, ECHO permutation and AES block cipher
- Improved single-key attacks on 8-round AES-192 and AES-256
- Linear-XOR and Additive Checksums Don’t Protect Damgård-Merkle Hashes from Generic Attacks
- Rebound attacks on Stribog
- Rebound distinguishers: results on the full Whirlpool compression function
- Rotational Rebound Attacks on Reduced Skein
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- Unaligned rebound attack: application to Keccak
Cited in
(16)- A (Second) Preimage Attack on the GOST Hash Function
- Cryptanalysis of the GOST Hash Function
- Impossible differential properties of reduced round Streebog
- Some methods of hash functions analysis with application to the GOST P 34.11-94 algorithm
- Related-key attacks on the compression function of Streebog
- Kupy-Neev hash function
- About ``\(k\)-bit security of MACs based on hash function Streebog
- Keyed Streebog is a secure PRF and MAC
- Rebound attacks on Stribog
- On the cryptographic properties of algorithms accompanying the applications of standards GOST R 34.11-2012 and GOST R 34.10-2012
- Cryptanalysis of the Round-Reduced GOST Hash Function
- Streebog compression function as PRF in secret-key settings
- Improved cryptanalysis on reduced-round GOST and Whirlpool hash function
- Distinguisher on full-round compression function of GOST R
- Integral distinguishers for reduced-round Stribog
- The security of GOST R 34.11-2012 against preimage and collision attacks
This page was built for publication: Cryptanalysis of GOST R hash function
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q402352)