Cryptanalysis of Reduced-Round Whirlwind
From MaRDI portal
Publication:3194587
DOI10.1007/978-3-319-19962-7_2zbMath1356.94075OpenAlexW2234103503MaRDI QIDQ3194587
Bingke Ma, Xiaoqian Li, Bao Li, Ronglin Hao
Publication date: 20 October 2015
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-19962-7_2
Related Items (2)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Improved cryptanalysis of AES-like permutations
- Whirlwind: a new cryptographic hash function
- Limited-Birthday Distinguishers for Hash Functions
- Block Ciphers – Focus on the Linear Layer (feat. PRIDE)
- New Preimage Attacks against Reduced SHA-1
- Collision Attack on 5 Rounds of Grøstl
- Multiple Limited-Birthday Distinguishers and Applications
- Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
- Cryptanalysis of Reduced-Round Whirlwind
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- Second Preimage Analysis of Whirlwind
- Cryptanalysis of Grindahl
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- Finding Preimages in Full MD5 Faster Than Exhaustive Search
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- Rebound Distinguishers: Results on the Full Whirlpool Compression Function
- Preimages for Step-Reduced SHA-2
- Improved Rebound Attack on the Finalist Grøstl
- (Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others
- Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family
- Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks
- FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison
- One Way Hash Functions and DES
This page was built for publication: Cryptanalysis of Reduced-Round Whirlwind