Related-Key Rectangle Attack on the Full SHACAL-1
From MaRDI portal
Publication:5429149
DOI10.1007/978-3-540-74462-7_3zbMath1161.94396OpenAlexW1540211477MaRDI QIDQ5429149
Orr Dunkelman, Nathan Keller, Jongsung Kim
Publication date: 29 November 2007
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-74462-7_3
Related Items (7)
A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis ⋮ On the related-key attack security of authenticated encryption schemes ⋮ When messages are keys: is HMAC a dual-PRF? ⋮ Hash Functions from Defective Ideal Ciphers ⋮ Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512 ⋮ Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA ⋮ Reflection Cryptanalysis of Some Ciphers
This page was built for publication: Related-Key Rectangle Attack on the Full SHACAL-1