Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool
From MaRDI portal
Publication:3013095
Recommendations
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
- Biclique cryptanalysis of full round AES-128 based hashing modes
- Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks
- Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing
- Practical attacks on AES-like cryptographic hash functions
Cites work
- scientific article; zbMATH DE number 1682693 (Why is no real title available?)
- scientific article; zbMATH DE number 1024070 (Why is no real title available?)
- scientific article; zbMATH DE number 954401 (Why is no real title available?)
- A Meet-in-the-Middle Attack on 8-Round AES
- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
- Automatic search for related-key differential characteristics in byte-oriented block ciphers: application to AES, Camellia, Khazad and others
- Blockcipher-Based Hashing Revisited
- Distinguisher and Related-Key Attack on the Full AES-256
- Finding Preimages in Full MD5 Faster Than Exhaustive Search
- Hash Functions and RFID Tags: Mind the Gap
- Improved cryptanalysis of the reduced Grøstl compression function, ECHO permutation and AES block cipher
- Improved single-key attacks on 8-round AES-192 and AES-256
- Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
- Known-Key Distinguishers for Some Block Ciphers
- MD4 is Not One-Way
- Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
- New Impossible Differential Attacks on AES
- Preimage Attacks on 3, 4, and 5-Pass HAVAL
- Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- Preimages for Reduced SHA-0 and SHA-1
- Preimages for Reduced-Round Tiger
- Preimages for step-reduced SHA-2
- Rebound distinguishers: results on the full Whirlpool compression function
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- The effects of the omission of last round's MixColumns on AES
- The rebound attack and subspace distinguishers: application to Whirlpool
Cited in
(26)- Simplified MITM modeling for permutations: new (quantum) attacks
- Generic MitM attack frameworks on sponge constructions
- Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2
- A Meet-in-the-Middle Attack on 8-Round AES
- Cryptanalysis of reduced-round Whirlwind
- The rebound attack and subspace distinguishers: application to Whirlpool
- Biclique cryptanalysis of full round AES-128 based hashing modes
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
- Cryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-2
- Key structures: improved related-key boomerang attack against the full AES-256
- Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials
- Quantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Triangulating rebound attack on AES-like hashing
- Automated meet-in-the-middle attack goes to Feistel
- Meet-in-the-middle preimage attacks on sponge-based hashing
- Diving deep into the preimage security of AES-like hashing
- Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}
- Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
- Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing
- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
- Preimage attacks on Feistel-SP functions: impact of omitting the last network twist
- Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD
- Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound
- An improved preimage attack against \texttt{HAVAL-3}
This page was built for publication: Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3013095)