Bicliques for preimages: attacks on Skein-512 and the SHA-2 family
From MaRDI portal
Publication:4899709
DOI10.1007/978-3-642-34047-5_15zbMATH Open1282.94049OpenAlexW2109766996MaRDI QIDQ4899709FDOQ4899709
Authors: Dmitry Khovratovich, Christian Rechberger, Alexandra Savelieva
Publication date: 8 January 2013
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-34047-5_15
Recommendations
hash functionSHA-2meet-in-the-middle attackbicliquesplice-and-cutSHA-3Skeininitial structurepreimage attackSHA-256SHA-512
Cited In (29)
- Biclique cryptanalysis of LBlock and TWINE
- Efficient implementation of SHA-3 hash function on 8-bit AVR-based sensor nodes
- Quantum collision attacks on reduced SHA-256 and SHA-512
- Cryptanalysis of reduced-round Whirlwind
- Biclique cryptanalysis of full round AES-128 based hashing modes
- New attacks on Feistel structures with improved memory complexities
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
- Improved attacks against reduced-round Whirlwind
- Simplified MITM modeling for permutations: new (quantum) attacks
- Rotational rebound attacks on reduced Skein
- Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework
- Higher-order differential meet-in-the-middle preimage attacks on SHA-1 and BLAKE
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
- Diving deep into the preimage security of AES-like hashing
- Improved differential meet-in-the-middle cryptanalysis
- New records in collision attacks on SHA-2
- Bad directions in cryptographic hash functions
- Improved cryptanalysis of Skein
- Partial-collision attack on the round-reduced compression function of Skein-256
- The boomerang attacks on the round-reduced Skein-512
- Speeding up preimage and key-recovery attacks with highly biased differential-linear approximations
- Bicliques with minimal data and time complexity for AES
- Improving the biclique cryptanalysis of AES
- Boomerang attack on step-reduced SHA-512
- Bicliques for permutations: collision and preimage attacks in stronger settings
- A framework for automated independent-biclique cryptanalysis
- Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD
- Collision attack on 4-branch, type-2 GFN based hash functions using sliced biclique cryptanalysis technique
- All subkeys recovery attack on block ciphers: extending meet-in-the-middle approach
This page was built for publication: Bicliques for preimages: attacks on Skein-512 and the SHA-2 family
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4899709)