Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique
From MaRDI portal
Publication:3454593
DOI10.1007/978-3-319-16745-9_19zbMath1400.94108MaRDI QIDQ3454593
Somitra Kumar Sanadhya, Megha Agrawal, Donghoon Chang, Mohona Ghosh
Publication date: 25 November 2015
Published in: Information Security and Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-16745-9_19
hash functions; generalized Feistel network; collision attack; double SP layer; sliced biclique cryptanalysis
94A60: Cryptography
Cites Work
- On the differential and linear efficiency of balanced Feistel networks
- Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes
- Fast software encryption. 3rd international workshop, FSE'96, Cambridge, UK, February 21-23, 1996. Proceedings
- Generalized Feistel networks revisited
- Security Analysis of GFN: 8-Round Distinguisher for 4-Branch Type-2 GFN
- Double-SP Is Weaker Than Single-SP: Rebound Attacks on Feistel Ciphers with Several Rounds
- Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes
- Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE
- Biclique Cryptanalysis of the Full AES
- Biclique Attack on the Full HIGHT
- On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- HIGHT: A New Block Cipher Suitable for Low-Resource Device
- The 128-Bit Blockcipher CLEFIA (Extended Abstract)
- Improving the Generalized Feistel
- On Generalized Feistel Networks
- Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher
- On the need for multipermutations: Cryptanalysis of MD4 and SAFER
- The cipher SHARK
- Two practical and provably secure block ciphers: BEAR and LION
- Unbalanced Feistel networks and block cipher design
- Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family
- Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2
- Bicliques for Permutations: Collision and Preimage Attacks in Stronger Settings
- Known-Key Distinguishers for Some Block Ciphers
- Fast Software Encryption