(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others
From MaRDI portal
Publication:4899700
DOI10.1007/978-3-642-34047-5_8zbMath1312.94101OpenAlexW2119153286MaRDI QIDQ4899700
Le Dong, Wenling Wu, Dengguo Feng, Shuang Wu, Jian Zou, Jian Guo
Publication date: 8 January 2013
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-34047-5_8
Related Items (8)
Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks ⋮ Cryptanalysis of the Round-Reduced GOST Hash Function ⋮ Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD ⋮ Cryptanalysis of Reduced-Round Whirlwind ⋮ Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing ⋮ Analysis of the Kupyna-256 Hash Function ⋮ Automatic search of meet-in-the-middle preimage attacks on AES-like hashing ⋮ Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound
This page was built for publication: (Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others