Non-full Sbox linearization: applications to collision attacks on round-reduced \textsc{keccak}
From MaRDI portal
Publication:1680222
DOI10.1007/978-3-319-63715-0_15zbMath1410.94108OpenAlexW2725050237MaRDI QIDQ1680222
Jian Guo, Ling Song, Guohong Liao
Publication date: 15 November 2017
Full work available at URL: https://doi.org/10.1007/978-3-319-63715-0_15
Related Items (8)
Quantum algorithm for Boolean equation solving and quantum algebraic attack on cryptosystems ⋮ Cryptanalysis of full LowMC and LowMC-M with algebraic techniques ⋮ Cryptanalysis of round-reduced KECCAK using non-linear structures ⋮ MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes ⋮ Collision attacks on round-reduced SHA-3 using conditional internal differentials ⋮ Exploring SAT for cryptanalysis: (quantum) collision attacks against 6-round SHA-3 ⋮ Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC ⋮ Practical collision attacks against round-reduced SHA-3
This page was built for publication: Non-full Sbox linearization: applications to collision attacks on round-reduced \textsc{keccak}