Second preimage analysis of Whirlwind
From MaRDI portal
Publication:3454591
DOI10.1007/978-3-319-16745-9_17zbMATH Open1400.94109OpenAlexW286115074MaRDI QIDQ3454591FDOQ3454591
Authors: Riham AlTawy, A. M. Youssef
Publication date: 25 November 2015
Published in: Information Security and Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-16745-9_17
Recommendations
- Cryptanalysis of reduced-round Whirlwind
- Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks
- Whirlwind: a new cryptographic hash function
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- (Pseudo) preimage attack on round-reduced Grøstl hash function and others
Cited In (6)
- Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3
- Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks
- Whirlwind: a new cryptographic hash function
- Cryptanalysis of Reduced-Round Whirlwind
- Improved attacks against reduced-round Whirlwind
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
This page was built for publication: Second preimage analysis of Whirlwind
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3454591)