Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl
From MaRDI portal
Publication:3058648
DOI10.1007/978-3-642-17373-8_3zbMath1253.94067OpenAlexW1568559070MaRDI QIDQ3058648
Yang Li, Yu Sasaki, K. Sakiyama, Kazuo Ohta, Lei Wang
Publication date: 7 December 2010
Published in: Advances in Cryptology - ASIACRYPT 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-17373-8_3
Related Items (12)
Improved Analysis of ECHO-256 ⋮ Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks ⋮ Improved attacks against reduced-round Whirlwind ⋮ Triangulating rebound attack on AES-like hashing ⋮ Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials ⋮ Quantum collision attacks on AES-like hashing with low quantum random access memories ⋮ Internal differential collision attacks on the reduced-round Grøstl-0 hash function ⋮ Improved cryptanalysis of AES-like permutations ⋮ Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function ⋮ Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ ⋮ Experimental Verification of Super-Sbox Analysis — Confirmation of Detailed Attack Complexity ⋮ The rebound attack and subspace distinguishers: application to Whirlpool
This page was built for publication: Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl