Preimage attacks on round-reduced Keccak-224/256 via an allocating approach
From MaRDI portal
Publication:2292707
DOI10.1007/978-3-030-17659-4_19OpenAlexW2925806937MaRDI QIDQ2292707FDOQ2292707
Publication date: 4 February 2020
Full work available at URL: https://doi.org/10.1007/978-3-030-17659-4_19
Recommendations
Cited In (14)
- Preimage attacks on 4-round Keccak by solving multivariate quadratic systems
- Cryptanalysis of round-reduced KECCAK using non-linear structures
- Automatic search of linear structure: applications to \textsc{Keccak} and \textsc{Ascon}
- Algebraic Attacks on Round-Reduced Keccak
- Meet-in-the-middle preimage attacks on sponge-based hashing
- Preimage Attacks on Reduced Tiger and SHA-2
- Improved (pseudo) preimage attacks on reduced-round \texttt{GOST} and \texttt{Grøstl-256} and studies on several truncation patterns for \texttt{AES}-like compression functions
- Cryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\)
- Exploring SAT for cryptanalysis: (quantum) collision attacks against 6-round SHA-3
- Collision attacks on round-reduced SHA-3 using conditional internal differentials
- New Results on the SymSum Distinguisher on Round-Reduced SHA3
- Allocating rotational cryptanalysis-based preimage attack on 4-round \textsc{Keccak}-224 for quantum setting
- Speeding up preimage and key-recovery attacks with highly biased differential-linear approximations
- Cryptanalysis of full LowMC and LowMC-M with algebraic techniques
This page was built for publication: Preimage attacks on round-reduced Keccak-224/256 via an allocating approach
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2292707)