Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family

From MaRDI portal
Publication:4899709

DOI10.1007/978-3-642-34047-5_15zbMath1282.94049OpenAlexW2109766996MaRDI QIDQ4899709

Christian Rechberger, Alexandra Savelieva, Dmitry Khovratovich

Publication date: 8 January 2013

Published in: Fast Software Encryption (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-34047-5_15




Related Items (22)

Quantum collision attacks on reduced SHA-256 and SHA-512Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacksEfficient implementation of SHA-3 hash function on 8-bit AVR-based sensor nodesBoomerang Attack on Step-Reduced SHA-512Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis TechniqueAll Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle ApproachThe Boomerang Attacks on the Round-Reduced Skein-512New Attacks on Feistel Structures with Improved Memory ComplexitiesHigher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKECollision attack on the full extended MD4 and pseudo-preimage attack on RIPEMDCryptanalysis of Reduced-Round WhirlwindImproving the Biclique Cryptanalysis of AESBad Directions in Cryptographic Hash FunctionsBicliques with Minimal Data and Time Complexity for AESPartial-Collision Attack on the Round-Reduced Compression Function of Skein-256A Framework for Automated Independent-Biclique CryptanalysisBiclique cryptanalysis of LBlock and TWINEMeet-in-the-middle attack with splice-and-cut technique and a general automatic frameworkImproved attacks against reduced-round WhirlwindSimplified MITM modeling for permutations: new (quantum) attacksRotational rebound attacks on reduced SkeinAutomatic search of meet-in-the-middle preimage attacks on AES-like hashing




This page was built for publication: Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family