Bicliques for preimages: attacks on Skein-512 and the SHA-2 family
From MaRDI portal
Publication:4899709
Recommendations
Cited in
(29)- Biclique cryptanalysis of LBlock and TWINE
- Efficient implementation of SHA-3 hash function on 8-bit AVR-based sensor nodes
- Quantum collision attacks on reduced SHA-256 and SHA-512
- Cryptanalysis of reduced-round Whirlwind
- Biclique cryptanalysis of full round AES-128 based hashing modes
- New attacks on Feistel structures with improved memory complexities
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
- Improved attacks against reduced-round Whirlwind
- Rotational rebound attacks on reduced Skein
- Simplified MITM modeling for permutations: new (quantum) attacks
- Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework
- Higher-order differential meet-in-the-middle preimage attacks on SHA-1 and BLAKE
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
- Diving deep into the preimage security of AES-like hashing
- Improved differential meet-in-the-middle cryptanalysis
- New records in collision attacks on SHA-2
- Bad directions in cryptographic hash functions
- Improved cryptanalysis of Skein
- Partial-collision attack on the round-reduced compression function of Skein-256
- The boomerang attacks on the round-reduced Skein-512
- Bicliques with minimal data and time complexity for AES
- Improving the biclique cryptanalysis of AES
- Speeding up preimage and key-recovery attacks with highly biased differential-linear approximations
- Boomerang attack on step-reduced SHA-512
- Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD
- A framework for automated independent-biclique cryptanalysis
- Bicliques for permutations: collision and preimage attacks in stronger settings
- Collision attack on 4-branch, type-2 GFN based hash functions using sliced biclique cryptanalysis technique
- All subkeys recovery attack on block ciphers: extending meet-in-the-middle approach
This page was built for publication: Bicliques for preimages: attacks on Skein-512 and the SHA-2 family
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4899709)