Analysis of Reduced-SHAvite-3-256 v2
From MaRDI portal
Publication:3013078
DOI10.1007/978-3-642-21702-9_5zbMath1282.94058OpenAlexW172899499MaRDI QIDQ3013078
María Naya-Plasencia, Thomas Peyrin, Marine Minier
Publication date: 7 July 2011
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-21702-9_5
Related Items (2)
Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes ⋮ The rebound attack and subspace distinguishers: application to Whirlpool
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round Lesamnta and SHAvite-3 512
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- Cryptanalysis of Grindahl
- Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- Improved Differential Attacks for ECHO and Grøstl
- Rebound Attack on the Full Lane Compression Function
- Rebound Distinguishers: Results on the Full Whirlpool Compression Function
- Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher
- Cryptanalysis of Hash Functions with Structures
- How to Break MD5 and Other Hash Functions
- Finding Collisions in the Full SHA-1
This page was built for publication: Analysis of Reduced-SHAvite-3-256 v2