A collision attack on a double-block-length compression function instantiated with round-reduced AES-256
From MaRDI portal
Publication:2942841
Recommendations
- Collision attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis
- Collision attack on the Hamsi-256 compression function
- Some Attacks Against a Double Length Hash Proposal
- Speeding up Collision Search for Byte-Oriented Hash Functions
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
Cited in
(1)
This page was built for publication: A collision attack on a double-block-length compression function instantiated with round-reduced AES-256
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2942841)