Second preimage analysis of Whirlwind
From MaRDI portal
Publication:3454591
Recommendations
- Cryptanalysis of reduced-round Whirlwind
- Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks
- Whirlwind: a new cryptographic hash function
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- (Pseudo) preimage attack on round-reduced Grøstl hash function and others
Cited in
(6)- Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks
- Cryptanalysis of reduced-round Whirlwind
- Whirlwind: a new cryptographic hash function
- Improved attacks against reduced-round Whirlwind
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
- Meet-in-the-middle attacks on reduced-round Hierocrypt-3
This page was built for publication: Second preimage analysis of Whirlwind
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3454591)