Security analysis of Even-Mansour structure hash functions
From MaRDI portal
Publication:2672452
DOI10.1007/978-3-030-88052-1_10zbMATH Open1500.94021OpenAlexW3200243439MaRDI QIDQ2672452FDOQ2672452
Authors: Ting Cui, Shiwei Chen, Chenhui Jin
Publication date: 8 June 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-88052-1_10
Recommendations
- Cryptanalysis of hash functions with structures
- Cryptanalysis of the ESSENCE family of hash functions
- On the security of multivariate hash functions
- Security Analysis of Multivariate Polynomials for Hashing
- Security analysis of the mode of JH hash function
- Cryptanalysis of the HaF family of hash functions
- scientific article; zbMATH DE number 7647212
- Selected Areas in Cryptography
- Analysis of Multivariate Hash Functions
hash functionpreimage attackmeet-in-the-middle techniqueEven-Mansour structure hash functionmulti-block collision attackpartial invariables of input-output
Cites Work
- A construction of a cipher from a single pseudorandom permutation.
- Key-alternating ciphers in a provable setting: encryption using a small number of public permutations. (Extended abstract)
- Minimalism in cryptography: the Even-Mansour scheme revisited
- Title not available (Why is that?)
- The PHOTON family of lightweight hash functions
- New key recovery attacks on minimal two-round Even-Mansour ciphers
- A single-key attack on the full GOST block cipher
- Low-memory attacks against two-round Even-Mansour using the 3-XOR problem
Cited In (2)
This page was built for publication: Security analysis of Even-Mansour structure hash functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2672452)