Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512
From MaRDI portal
Publication:3558326
DOI10.1007/978-3-642-12678-9_25zbMath1284.94075OpenAlexW1788434476WikidataQ27996449 ScholiaQ27996449MaRDI QIDQ3558326
Gaëtan Leurent, Praveen Gauravaram, María Naya-Plasencia, Florian Mendel, Martin Schläffer, Thomas Peyrin, Christian Rechberger
Publication date: 4 May 2010
Published in: Progress in Cryptology – AFRICACRYPT 2010 (Search for Journal in Brave)
Full work available at URL: http://ehash.iaik.tugraz.at/wiki/SHAvite-3#Cryptanalysis
Related Items (4)
Security analysis of randomize-hash-then-sign digital signatures ⋮ Analysis of Reduced-SHAvite-3-256 v2 ⋮ Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes ⋮ Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round Lesamnta and SHAvite-3 512
This page was built for publication: Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512