Streebog compression function as PRF in secret-key settings
From MaRDI portal
Publication:5042273
Recommendations
Cites work
- scientific article; zbMATH DE number 4195165 (Why is no real title available?)
- scientific article; zbMATH DE number 1942427 (Why is no real title available?)
- scientific article; zbMATH DE number 1455090 (Why is no real title available?)
- Cryptanalysis of GOST R hash function
- Cryptanalysis of the Round-Reduced GOST Hash Function
- Distinguisher on full-round compression function of GOST R
- Impossible differential properties of reduced round Streebog
- Improved (pseudo) preimage attacks on reduced-round \texttt{GOST} and \texttt{Grøstl-256} and studies on several truncation patterns for \texttt{AES}-like compression functions
- Improved cryptanalysis on reduced-round GOST and Whirlpool hash function
- Improved generic attacks against hash-based MACs and HAIFA
- Improved key recovery attacks on reduced-round AES in the single-key setting
- Integral distinguishers for reduced-round Stribog
- New Proofs for NMAC and HMAC: Security Without Collision-Resistance
- One Way Hash Functions and DES
- Polytopic cryptanalysis
- Practical attacks on AES-like cryptographic hash functions
- Preimage attacks on reduced-round Stribog
- Rebound attacks on Stribog
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- The usage of counter revisited: second-preimage attack on new Russian standardized hash function
Cited in
(4)
This page was built for publication: Streebog compression function as PRF in secret-key settings
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5042273)