A collision attack on a double-block-length compression function instantiated with round-reduced AES-256
From MaRDI portal
Publication:2942841
DOI10.1007/978-3-319-15943-0_17zbMATH Open1344.94038OpenAlexW2960066625MaRDI QIDQ2942841FDOQ2942841
Authors: Jiageng Chen, Shouichi Hirose, Hidenori Kuwakado, Atsuko Miyaji
Publication date: 11 September 2015
Published in: Information Security and Cryptology - ICISC 2014 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-15943-0_17
Recommendations
- Collision attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis
- Collision attack on the Hamsi-256 compression function
- Some Attacks Against a Double Length Hash Proposal
- Speeding up Collision Search for Byte-Oriented Hash Functions
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
Cited In (1)
This page was built for publication: A collision attack on a double-block-length compression function instantiated with round-reduced AES-256
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2942841)