Boomerang distinguishers for full HAS-160 compression function
From MaRDI portal
Publication:4912409
DOI10.1007/978-3-642-34117-5_10zbMATH Open1292.94133OpenAlexW15461156MaRDI QIDQ4912409FDOQ4912409
Authors: Yu Sasaki, Lei Wang, Yasuhiro Takasaki, K. Sakiyama, Kazuo Ohta
Publication date: 4 April 2013
Published in: Advances in Information and Computer Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-34117-5_10
Recommendations
Cited In (9)
- Colliding Message Pair for 53-Step HAS-160
- Cryptanalysis of round-reduced HAS-160
- Second order collision for the 42-step reduced DHA-256 hash function
- Improved related-key rectangle attack on the full HAS-160 encryption mode
- Hash Functions and the (Amplified) Boomerang Attack
- Boomerang Distinguisher for the SIMD-512 Compression Function
- Boomerang attack on step-reduced SHA-512
- Boomerang distinguishers on MD4-family: first practical results on full 5-pass HAVAL
- Boomerang attacks on BLAKE-32
This page was built for publication: Boomerang distinguishers for full HAS-160 compression function
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4912409)