Cryptanalysis of GOST R hash function
From MaRDI portal
Publication:402352
DOI10.1016/J.IPL.2014.07.007zbMATH Open1358.94083DBLPjournals/ipl/WangYW14OpenAlexW2130420945WikidataQ57383102 ScholiaQ57383102MaRDI QIDQ402352FDOQ402352
Authors: Zongyue Wang, Hongbo Yu, Xiaoyun Wang
Publication date: 28 August 2014
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2014.07.007
Recommendations
- Cryptanalysis of the Round-Reduced GOST Hash Function
- Cryptanalysis of the GOST Hash Function
- Improved cryptanalysis on reduced-round GOST and Whirlpool hash function
- The security of GOST R 34.11-2012 against preimage and collision attacks
- Some methods of hash functions analysis with application to the GOST P 34.11-94 algorithm
Cites Work
- Advances in Cryptology – CRYPTO 2004
- Linear-XOR and Additive Checksums Don’t Protect Damgård-Merkle Hashes from Generic Attacks
- Finding Collisions in the Full SHA-1
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- Improved cryptanalysis of the reduced Grøstl compression function, ECHO permutation and AES block cipher
- How to Break MD5 and Other Hash Functions
- Rotational Rebound Attacks on Reduced Skein
- Improved single-key attacks on 8-round AES-192 and AES-256
- Rebound attacks on Stribog
- Rebound distinguishers: results on the full Whirlpool compression function
- Unaligned rebound attack: application to Keccak
Cited In (16)
- A (Second) Preimage Attack on the GOST Hash Function
- Cryptanalysis of the GOST Hash Function
- Impossible differential properties of reduced round Streebog
- Some methods of hash functions analysis with application to the GOST P 34.11-94 algorithm
- Related-key attacks on the compression function of Streebog
- Kupy-Neev hash function
- About ``\(k\)-bit security of MACs based on hash function Streebog
- Keyed Streebog is a secure PRF and MAC
- Rebound attacks on Stribog
- On the cryptographic properties of algorithms accompanying the applications of standards GOST R 34.11-2012 and GOST R 34.10-2012
- Cryptanalysis of the Round-Reduced GOST Hash Function
- Streebog compression function as PRF in secret-key settings
- Improved cryptanalysis on reduced-round GOST and Whirlpool hash function
- Distinguisher on full-round compression function of GOST R
- Integral distinguishers for reduced-round Stribog
- The security of GOST R 34.11-2012 against preimage and collision attacks
Uses Software
This page was built for publication: Cryptanalysis of GOST R hash function
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q402352)