Mathematical Research Data Initiative
Main page
Recent changes
Random page
SPARQL
MaRDI@GitHub
New item
Special pages
In other projects
MaRDI portal item
Discussion
View source
View history
English
Log in

A collision attack on a double-block-length compression function instantiated with round-reduced AES-256

From MaRDI portal
Publication:2942841
Jump to:navigation, search

DOI10.1007/978-3-319-15943-0_17zbMATH Open1344.94038OpenAlexW2960066625MaRDI QIDQ2942841FDOQ2942841


Authors: Jiageng Chen, Shouichi Hirose, Hidenori Kuwakado, Atsuko Miyaji Edit this on Wikidata


Publication date: 11 September 2015

Published in: Information Security and Cryptology - ICISC 2014 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-319-15943-0_17




Recommendations

  • Collision attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis
  • Collision attack on the Hamsi-256 compression function
  • Some Attacks Against a Double Length Hash Proposal
  • Speeding up Collision Search for Byte-Oriented Hash Functions
  • The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl


zbMATH Keywords

rebound attackAES-256double-block-length compression functionfree-start collision attack


Mathematics Subject Classification ID

Cryptography (94A60)



Cited In (1)

  • Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function





This page was built for publication: A collision attack on a double-block-length compression function instantiated with round-reduced AES-256

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2942841)

Retrieved from "https://portal.mardi4nfdi.de/w/index.php?title=Publication:2942841&oldid=15934719"
Tools
What links here
Related changes
Printable version
Permanent link
Page information
This page was last edited on 3 February 2024, at 20:16. Warning: Page may not contain recent updates.
Privacy policy
About MaRDI portal
Disclaimers
Imprint
Powered by MediaWiki