How to improve rebound attacks
From MaRDI portal
Publication:5199191
DOI10.1007/978-3-642-22792-9_11zbMATH Open1287.94090OpenAlexW72943107MaRDI QIDQ5199191FDOQ5199191
Authors: María Naya-Plasencia
Publication date: 12 August 2011
Published in: Advances in Cryptology – CRYPTO 2011 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-22792-9_11
Recommendations
Cited In (16)
- Quantum algorithms for the \(k\)-XOR problem
- The rebound attack and subspace distinguishers: application to Whirlpool
- Some results on Fruit
- Differential meet-in-the-middle cryptanalysis
- A new algorithm for the unbalanced meet-in-the-middle problem
- Efficient dissection of bicomposite problems with cryptanalytic applications
- Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials
- Triangulating rebound attack on AES-like hashing
- A generic algorithm for efficient key recovery in differential attacks -- and its associated tool
- Practical Analysis of Reduced-Round Keccak
- Improved cryptanalysis of AES-like permutations
- Generic MitM attack frameworks on sponge constructions
- Cryptanalysis of full sprout
- Quantum collision attacks on AES-like hashing with low quantum random access memories
- Improved analysis of ECHO-256
- LHash: a lightweight hash function
This page was built for publication: How to improve rebound attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5199191)