Security analysis of Even-Mansour structure hash functions
From MaRDI portal
Publication:2672452
Recommendations
- Cryptanalysis of hash functions with structures
- Cryptanalysis of the ESSENCE family of hash functions
- On the security of multivariate hash functions
- Security Analysis of Multivariate Polynomials for Hashing
- Security analysis of the mode of JH hash function
- Cryptanalysis of the HaF family of hash functions
- scientific article; zbMATH DE number 7647212
- Selected Areas in Cryptography
- Analysis of Multivariate Hash Functions
Cites work
- scientific article; zbMATH DE number 1024070 (Why is no real title available?)
- A construction of a cipher from a single pseudorandom permutation.
- A single-key attack on the full GOST block cipher
- Key-alternating ciphers in a provable setting: encryption using a small number of public permutations. (Extended abstract)
- Low-memory attacks against two-round Even-Mansour using the 3-XOR problem
- Minimalism in cryptography: the Even-Mansour scheme revisited
- New key recovery attacks on minimal two-round Even-Mansour ciphers
- The PHOTON family of lightweight hash functions
This page was built for publication: Security analysis of Even-Mansour structure hash functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2672452)