Improved (pseudo) preimage attacks on reduced-round \texttt{GOST} and \texttt{Grøstl-256} and studies on several truncation patterns for \texttt{AES}-like compression functions
From MaRDI portal
Publication:1800579
DOI10.1007/978-3-319-22425-1_6zbMath1398.94140OpenAlexW2194584616MaRDI QIDQ1800579
Xiaoqian Li, Bingke Ma, Ronglin Hao, Bao Li
Publication date: 24 October 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-22425-1_6
cryptanalysishash functionpreimage\texttt{GOST}\texttt{Grøstl-256}meet-in-the-middle preimage attacktruncation patterns
Related Items (4)
Streebog compression function as PRF in secret-key settings ⋮ Related-key attacks on the compression function of Streebog ⋮ Keyed Streebog is a secure PRF and MAC ⋮ Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing
This page was built for publication: Improved (pseudo) preimage attacks on reduced-round \texttt{GOST} and \texttt{Grøstl-256} and studies on several truncation patterns for \texttt{AES}-like compression functions