Security reductions of the second round SHA-3 candidates
From MaRDI portal
Publication:3073779
Recommendations
- Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein
- The State of Hash Functions and the NIST SHA-3 Competition
- The first 30 years of cryptographic hash functions and the NIST SHA-3 competition
- The NIST SHA-3 Competition: A Perspective on the Final Year
- Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512
Cited in
(13)- Security analysis of the mode of JH hash function
- Algebraic analysis of SHA-3 algorithm security
- Extracts from the SHA-3 competition
- Improved indifferentiability security bound for the JH mode
- Compactness of hashing modes and efficiency beyond Merkle tree
- StriBob: аутентифицированное шифрование с помощью подстановки LPS из ГОСТ Р 34.11-2012
- The first 30 years of cryptographic hash functions and the NIST SHA-3 competition
- Provable Security of BLAKE with Non-ideal Compression Function
- Tight preimage resistance of the sponge construction
- Open problems in hash function security
- The NIST SHA-3 Competition: A Perspective on the Final Year
- The State of Hash Functions and the NIST SHA-3 Competition
- Replacing SHA-2 with SHA-3 Enhances Generic Security of $$\mathtt {HMAC}$$
This page was built for publication: Security reductions of the second round SHA-3 candidates
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3073779)