Cryptanalysis of FORK-256
From MaRDI portal
Publication:3524879
DOI10.1007/978-3-540-74619-5_2zbMATH Open1186.94460OpenAlexW1669611298WikidataQ131317866 ScholiaQ131317866MaRDI QIDQ3524879FDOQ3524879
Authors: Krystian Matusiewicz, Thomas Peyrin, Olivier Billet, Scott Contini, Josef Pieprzyk
Publication date: 16 September 2008
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-74619-5_2
Recommendations
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Theory of software (68N99)
Cited In (10)
- Speeding up Collision Search for Byte-Oriented Hash Functions
- Cryptanalysis of ESSENCE
- A New Dedicated 256-Bit Hash Function: FORK-256
- The Hash Function Family LAKE
- Title not available (Why is that?)
- Cryptanalysis of Grindahl
- Cryptanalysis of the FSR-255 hash function
- Cryptanalysis of Reduced Variants of the FORK-256 Hash Function
- Cryptanalyses of narrow-pipe mode of operation in AURORA-512 hash function
- A Meet-in-the-Middle Collision Attack Against the New FORK-256
This page was built for publication: Cryptanalysis of FORK-256
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3524879)