LHash: A Lightweight Hash Function
From MaRDI portal
Publication:3454161
DOI10.1007/978-3-319-12087-4_19zbMath1347.94062OpenAlexW285642768MaRDI QIDQ3454161
Shuang Wu, Le Dong, Jian Zou, Lei Zhang, Wenling Wu
Publication date: 2 December 2015
Published in: Information Security and Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-12087-4_19
Cites Work
- The rebound attack and subspace distinguishers: application to Whirlpool
- Quark: a lightweight hash
- Double-SP Is Weaker Than Single-SP: Rebound Attacks on Feistel Ciphers with Several Rounds
- Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials
- On the Influence of the Algebraic Degree of $F^{-1}$ on the Algebraic Degree of $G \circ F$
- LBlock: A Lightweight Block Cipher
- Higher-Order Differential Properties of Keccak and Luffa
- Rotational Rebound Attacks on Reduced Skein
- Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256
- The LED Block Cipher
- Piccolo: An Ultra-Lightweight Blockcipher
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- Trivium
- HIGHT: A New Block Cipher Suitable for Low-Resource Device
- PRESENT: An Ultra-Lightweight Block Cipher
- Improving the Generalized Feistel
- Rebound Attack on Reduced-Round Versions of JH
- Rotational Cryptanalysis of ARX
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware
- Some Plausible Constructions of Double-Block-Length Hash Functions
- Rebound Attack on the Full Lane Compression Function
- Rebound Distinguishers: Results on the Full Whirlpool Compression Function
- Improved Rebound Attack on the Finalist Grøstl
- PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications
- Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks
- How to Improve Rebound Attacks
- The PHOTON Family of Lightweight Hash Functions
- Hash Functions and RFID Tags: Mind the Gap