Rebound Attacks on the Reduced Grøstl Hash Function
From MaRDI portal
Publication:5189461
DOI10.1007/978-3-642-11925-5_24zbMATH Open1274.94099OpenAlexW1509358216MaRDI QIDQ5189461FDOQ5189461
Authors: Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen
Publication date: 16 March 2010
Published in: Topics in Cryptology - CT-RSA 2010 (Search for Journal in Brave)
Full work available at URL: https://lirias.kuleuven.be/handle/123456789/280753
Recommendations
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- Improved collision attacks on the reduced-round Grøstl hash function
- (Pseudo) preimage attack on round-reduced Grøstl hash function and others
- Internal differential collision attacks on the reduced-round Grøstl-0 hash function
- Triangulating rebound attack on AES-like hashing
- Rebound attack on reduced-round versions of JH
- Hash Functions and the (Amplified) Boomerang Attack
- Cryptanalysis of the Round-Reduced GOST Hash Function
- Non-linear Reduced Round Attacks against SHA-2 Hash Family
- Boomerang Attacks on Hash Function Using Auxiliary Differentials
Cited In (19)
- The rebound attack and subspace distinguishers: application to Whirlpool
- Subspace distinguisher for 5/8 rounds of the ECHO-256 hash function
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- Collision attack on 5 rounds of Grøstl
- Analysis of the Kupyna-256 Hash Function
- Cryptanalysis of Grindahl
- Improved rebound attacks on AESQ: core permutation of CAESAR candidate PAEQ
- On the indifferentiability of the Grøstl hash function
- Triangulating rebound attack on AES-like hashing
- Improved cryptanalysis of AES-like permutations
- (Pseudo) preimage attack on round-reduced Grøstl hash function and others
- Partial-collision attack on the round-reduced compression function of Skein-256
- Internal differential collision attacks on the reduced-round Grøstl-0 hash function
- The boomerang attacks on the round-reduced Skein-512
- Rebound attack on reduced-round versions of JH
- Improved collision attacks on the reduced-round Grøstl hash function
- How to improve rebound attacks
- Improved rebound attack on the finalist Grøstl
- Boomerang Attacks on Hash Function Using Auxiliary Differentials
This page was built for publication: Rebound Attacks on the Reduced Grøstl Hash Function
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5189461)