Security analysis of Even-Mansour structure hash functions
From MaRDI portal
Publication:2672452
DOI10.1007/978-3-030-88052-1_10zbMath1500.94021OpenAlexW3200243439MaRDI QIDQ2672452
Ting Cui, Shi-Wei Chen, Chen-Hui Jin
Publication date: 8 June 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-88052-1_10
hash functionpreimage attackmeet-in-the-middle techniqueEven-Mansour structure hash functionmulti-block collision attackpartial invariables of input-output
Cites Work
- Unnamed Item
- A construction of a cipher from a single pseudorandom permutation.
- A single-key attack on the full GOST block cipher
- Low-memory attacks against two-round Even-Mansour using the 3-XOR problem
- New key recovery attacks on minimal two-round Even-Mansour ciphers
- Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations
- Minimalism in Cryptography: The Even-Mansour Scheme Revisited
- The PHOTON Family of Lightweight Hash Functions
This page was built for publication: Security analysis of Even-Mansour structure hash functions