Cryptanalysis of the Round-Reduced GOST Hash Function
From MaRDI portal
Publication:3454162
DOI10.1007/978-3-319-12087-4_20zbMATH Open1347.94067OpenAlexW145806357MaRDI QIDQ3454162FDOQ3454162
Authors: Jian Zou, Wenling Wu, Shuang Wu
Publication date: 2 December 2015
Published in: Information Security and Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-12087-4_20
Recommendations
- Cryptanalysis of the GOST Hash Function
- Cryptanalysis of GOST R hash function
- Improved cryptanalysis on reduced-round GOST and Whirlpool hash function
- scientific article; zbMATH DE number 1689015
- Cryptanalysis of round-reduced HAS-160
- Cryptanalysis of Reduced Variants of the FORK-256 Hash Function
- Cryptanalysis of GOST in the multiple-key scenario
- Cryptanalysis of SHA-0 and reduced SHA-1
- scientific article; zbMATH DE number 1980984
meet-in-the-middlemulti-collisionrebound attackGOSTcollision attackguess-and-determinepreimage attack
Cites Work
- Monte Carlo Methods for Index Computation (mod p)
- Advances in Cryptology – CRYPTO 2004
- Finding Collisions in the Full SHA-1
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- Rebound attack on the full Lane compression function
- Improved cryptanalysis of the reduced Grøstl compression function, ECHO permutation and AES block cipher
- How to Break MD5 and Other Hash Functions
- Efficient Collision Search Attacks on SHA-0
- Rebound distinguishers: results on the full Whirlpool compression function
- Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
- A (Second) Preimage Attack on the GOST Hash Function
- (Pseudo) preimage attack on round-reduced Grøstl hash function and others
- Cryptanalysis of the GOST Hash Function
- Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks
Cited In (14)
- Cryptanalysis of GOST R hash function
- A (Second) Preimage Attack on the GOST Hash Function
- Cryptanalysis of the GOST Hash Function
- Impossible differential properties of reduced round Streebog
- Some methods of hash functions analysis with application to the GOST P 34.11-94 algorithm
- Related-key attacks on the compression function of Streebog
- About ``\(k\)-bit security of MACs based on hash function Streebog
- Keyed Streebog is a secure PRF and MAC
- Rebound Attacks on the Reduced Grøstl Hash Function
- Streebog compression function as PRF in secret-key settings
- Improved cryptanalysis on reduced-round GOST and Whirlpool hash function
- Distinguisher on full-round compression function of GOST R
- The security of GOST R 34.11-2012 against preimage and collision attacks
- Preimage attacks on reduced-round Stribog
This page was built for publication: Cryptanalysis of the Round-Reduced GOST Hash Function
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3454162)