Analysis of the Kupyna-256 Hash Function
From MaRDI portal
Publication:4639499
DOI10.1007/978-3-662-52993-5_29zbMath1385.94031OpenAlexW2406314024MaRDI QIDQ4639499
Florian Mendel, Maria Eichlseder, Christoph Dobraunig
Publication date: 9 May 2018
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-52993-5_29
Cites Work
- Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19--21, 2012. Revised selected papers
- The rebound attack and subspace distinguishers: application to Whirlpool
- Collision Attack on 5 Rounds of Grøstl
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- Cryptanalysis of the GOST Hash Function
- Rebound Distinguishers: Results on the Full Whirlpool Compression Function
- The Wide Trail Design Strategy
- Improved Rebound Attack on the Finalist Grøstl
- (Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others
- Rebound Attacks on the Reduced Grøstl Hash Function