Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family
From MaRDI portal
Publication:4899709
DOI10.1007/978-3-642-34047-5_15zbMath1282.94049OpenAlexW2109766996MaRDI QIDQ4899709
Christian Rechberger, Alexandra Savelieva, Dmitry Khovratovich
Publication date: 8 January 2013
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-34047-5_15
hash functionSHA-2meet-in-the-middle attackbicliquesplice-and-cutSHA-3Skeininitial structurepreimage attackSHA-256SHA-512
Related Items (22)
Quantum collision attacks on reduced SHA-256 and SHA-512 ⋮ Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks ⋮ Efficient implementation of SHA-3 hash function on 8-bit AVR-based sensor nodes ⋮ Boomerang Attack on Step-Reduced SHA-512 ⋮ Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique ⋮ All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach ⋮ The Boomerang Attacks on the Round-Reduced Skein-512 ⋮ New Attacks on Feistel Structures with Improved Memory Complexities ⋮ Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE ⋮ Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD ⋮ Cryptanalysis of Reduced-Round Whirlwind ⋮ Improving the Biclique Cryptanalysis of AES ⋮ Bad Directions in Cryptographic Hash Functions ⋮ Bicliques with Minimal Data and Time Complexity for AES ⋮ Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256 ⋮ A Framework for Automated Independent-Biclique Cryptanalysis ⋮ Biclique cryptanalysis of LBlock and TWINE ⋮ Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework ⋮ Improved attacks against reduced-round Whirlwind ⋮ Simplified MITM modeling for permutations: new (quantum) attacks ⋮ Rotational rebound attacks on reduced Skein ⋮ Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
This page was built for publication: Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family