Second preimage analysis of Whirlwind
From MaRDI portal
Publication:3454591
DOI10.1007/978-3-319-16745-9_17zbMATH Open1400.94109OpenAlexW286115074MaRDI QIDQ3454591FDOQ3454591
Authors: Riham AlTawy, A. M. Youssef
Publication date: 25 November 2015
Published in: Information Security and Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-16745-9_17
Recommendations
- Cryptanalysis of reduced-round Whirlwind
- Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks
- Whirlwind: a new cryptographic hash function
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- (Pseudo) preimage attack on round-reduced Grøstl hash function and others
Cited In (6)
- Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks
- Cryptanalysis of reduced-round Whirlwind
- Whirlwind: a new cryptographic hash function
- Improved attacks against reduced-round Whirlwind
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
- Meet-in-the-middle attacks on reduced-round Hierocrypt-3
This page was built for publication: Second preimage analysis of Whirlwind
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3454591)