The boomerang attacks on the round-reduced Skein-512
From MaRDI portal
Publication:3455506
Recommendations
Cites work
- Bicliques for preimages: attacks on Skein-512 and the SHA-2 family
- Boomerang Attacks on Hash Function Using Auxiliary Differentials
- How to Break MD5 and Other Hash Functions
- Improved cryptanalysis of Skein
- Near-collisions on the reduced-round compression functions of Skein and BLAKE
- Rebound Attacks on the Reduced Grøstl Hash Function
- Related-Key Boomerang and Rectangle Attacks
- Rotational Rebound Attacks on Reduced Skein
- Rotational cryptanalysis of ARX
- Second-order differential collisions for reduced SHA-256
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
Cited in
(6)
This page was built for publication: The boomerang attacks on the round-reduced Skein-512
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3455506)