Boomerang Distinguisher for the SIMD-512 Compression Function
From MaRDI portal
Publication:3104738
DOI10.1007/978-3-642-25578-6_19zbMath1291.94129MaRDI QIDQ3104738
Publication date: 16 December 2011
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-25578-6_19
94A60: Cryptography
Related Items
Second order collision for the 42-step reduced DHA-256 hash function, Boomerang Attack on Step-Reduced SHA-512, Boomerang and Slide-Rotational Analysis of the SM3 Hash Function
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Cryptanalysis of the Compression Function of SIMD
- Boomerang Attacks on BLAKE-32
- Second-Order Differential Collisions for Reduced SHA-256
- Distinguisher and Related-Key Attack on the Full AES-256
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- Hash Functions and the (Amplified) Boomerang Attack
- Cube Attacks on Tweakable Black Box Polynomials
- Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher
- A Distinguisher for the Compression Function of SIMD-512
- Higher Order Derivatives and Differential Cryptanalysis
- The Return of the Cryptographic Boomerang
- How to Break MD5 and Other Hash Functions
- Finding Collisions in the Full SHA-1
- A Failure-Friendly Design Principle for Hash Functions
- Topics in Cryptology – CT-RSA 2005