Boomerang Attack on Step-Reduced SHA-512
From MaRDI portal
Publication:3454592
DOI10.1007/978-3-319-16745-9_18zbMath1400.94177OpenAlexW313882520MaRDI QIDQ3454592
Publication date: 25 November 2015
Published in: Information Security and Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-16745-9_18
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVAL
- Boomerang Attacks on Hash Function Using Auxiliary Differentials
- Branching Heuristics in Differential Collision Search with Applications to SHA-512
- Boomerang Attacks on BLAKE-32
- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
- Second-Order Differential Collisions for Reduced SHA-256
- Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions
- Boomerang Distinguisher for the SIMD-512 Compression Function
- Preimage Attacks on Reduced Tiger and SHA-2
- The Boomerang Attacks on the Round-Reduced Skein-512
- Boomerang and Slide-Rotational Analysis of the SM3 Hash Function
- Collisions for Step-Reduced SHA-256
- Hash Functions and the (Amplified) Boomerang Attack
- Analysis of Step-Reduced SHA-256
- Collisions and Other Non-random Properties for Step-Reduced SHA-256
- Preimages for Step-Reduced SHA-2
- Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family
- Boomerang Distinguishers for Full HAS-160 Compression Function
- Improving Local Collisions: New Attacks on Reduced SHA-256
- Improved Boomerang Attacks on SM3
- How to Break MD5 and Other Hash Functions
- Related-Key Boomerang and Rectangle Attacks
- Finding Collisions in the Full SHA-1
- New Collision Attacks against Up to 24-Step SHA-2