Improved Analysis of ECHO-256
From MaRDI portal
Publication:2889861
DOI10.1007/978-3-642-28496-0_2zbMath1292.94084OpenAlexW1441956853MaRDI QIDQ2889861
Martin Schläffer, Jérémy Jean, María Naya-Plasencia
Publication date: 8 June 2012
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-28496-0_2
Related Items (6)
Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials ⋮ Quantum collision attacks on AES-like hashing with low quantum random access memories ⋮ Improved cryptanalysis of AES-like permutations ⋮ Rotational rebound attacks on reduced Skein ⋮ Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ ⋮ The rebound attack and subspace distinguishers: application to Whirlpool
Cites Work
- Unnamed Item
- Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
- Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl
- Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- Understanding Two-Round Differentials in AES
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- Improved Differential Attacks for ECHO and Grøstl
- Rebound Attack on the Full Lane Compression Function
- Rebound Distinguishers: Results on the Full Whirlpool Compression Function
- How to Improve Rebound Attacks
- Advanced Encryption Standard – AES
This page was built for publication: Improved Analysis of ECHO-256