The boomerang attacks on the round-reduced Skein-512
From MaRDI portal
Publication:3455506
DOI10.1007/978-3-642-35999-6_19zbMATH Open1327.94080OpenAlexW571925191MaRDI QIDQ3455506FDOQ3455506
Authors: Hongbo Yu, Jiazhe Chen, Xiaoyun Wang
Publication date: 4 December 2015
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-35999-6_19
Recommendations
Cites Work
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- How to Break MD5 and Other Hash Functions
- Rotational Rebound Attacks on Reduced Skein
- Bicliques for preimages: attacks on Skein-512 and the SHA-2 family
- Rebound Attacks on the Reduced Grøstl Hash Function
- Related-Key Boomerang and Rectangle Attacks
- Boomerang Attacks on Hash Function Using Auxiliary Differentials
- Near-collisions on the reduced-round compression functions of Skein and BLAKE
- Rotational cryptanalysis of ARX
- Improved cryptanalysis of Skein
- Second-order differential collisions for reduced SHA-256
Cited In (6)
Uses Software
This page was built for publication: The boomerang attacks on the round-reduced Skein-512
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3455506)