Cryptanalysis of Luffa v2 Components
From MaRDI portal
Publication:3084268
DOI10.1007/978-3-642-19574-7_26zbMath1293.94083OpenAlexW8084311MaRDI QIDQ3084268
Dmitry Khovratovich, Andrea Röck, Martin Schläffer, María Naya-Plasencia
Publication date: 15 March 2011
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19574-7_26
cryptanalysishash functionsdistinguisherrebound attacksemi-free-start collisionSHA-3 competitionLuffa
Related Items (6)
Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes ⋮ Higher-Order Differential Properties of Keccak and Luffa ⋮ Rotational rebound attacks on reduced Skein ⋮ Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function ⋮ Cryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-2 ⋮ The rebound attack and subspace distinguishers: application to Whirlpool
Cites Work
- Unnamed Item
- Unnamed Item
- Distinguisher and Related-Key Attack on the Full AES-256
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- Higher Order Differential Attack on Step-Reduced Variants of Luffa v1
- Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher
This page was built for publication: Cryptanalysis of Luffa v2 Components