How to improve rebound attacks
From MaRDI portal
Publication:5199191
Recommendations
Cited in
(16)- Quantum algorithms for the \(k\)-XOR problem
- Some results on Fruit
- The rebound attack and subspace distinguishers: application to Whirlpool
- Differential meet-in-the-middle cryptanalysis
- A new algorithm for the unbalanced meet-in-the-middle problem
- Efficient dissection of bicomposite problems with cryptanalytic applications
- Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials
- Practical Analysis of Reduced-Round Keccak
- Triangulating rebound attack on AES-like hashing
- A generic algorithm for efficient key recovery in differential attacks -- and its associated tool
- Improved cryptanalysis of AES-like permutations
- Cryptanalysis of full sprout
- Generic MitM attack frameworks on sponge constructions
- Quantum collision attacks on AES-like hashing with low quantum random access memories
- Improved analysis of ECHO-256
- LHash: a lightweight hash function
This page was built for publication: How to improve rebound attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5199191)