Cryptanalysis of GOST R hash function
From MaRDI portal
Publication:402352
DOI10.1016/j.ipl.2014.07.007zbMath1358.94083OpenAlexW2130420945WikidataQ57383102 ScholiaQ57383102MaRDI QIDQ402352
Hongbo Yu, Xiaoyun Wang, Zongyue Wang
Publication date: 28 August 2014
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2014.07.007
Related Items (6)
Streebog compression function as PRF in secret-key settings ⋮ Impossible Differential Properties of Reduced Round Streebog ⋮ Related-key attacks on the compression function of Streebog ⋮ Keyed Streebog is a secure PRF and MAC ⋮ Стойкость ГОСТ Р 34.11-2012 к атаке поиска прообраза и к атаке поиска коллизий ⋮ Distinguisher on full-round compression function of GOST R
Uses Software
Cites Work
- Rotational Rebound Attacks on Reduced Skein
- Improved Single-Key Attacks on 8-Round AES-192 and AES-256
- Rebound Attacks on Stribog
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- Rebound Distinguishers: Results on the Full Whirlpool Compression Function
- Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher
- Unaligned Rebound Attack: Application to Keccak
- Advances in Cryptology – CRYPTO 2004
- How to Break MD5 and Other Hash Functions
- Finding Collisions in the Full SHA-1
- Linear-XOR and Additive Checksums Don’t Protect Damgård-Merkle Hashes from Generic Attacks
This page was built for publication: Cryptanalysis of GOST R hash function