Improved attacks against reduced-round Whirlwind
From MaRDI portal
Publication:6063133
DOI10.1007/s10623-023-01254-0zbMath1526.94045OpenAlexW4383620520MaRDI QIDQ6063133
Bingyou Dong, Xiaoyang Dong, Guoyan Zhang, Jialiang Hua, Congming Wei
Publication date: 7 November 2023
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-023-01254-0
Cites Work
- Unnamed Item
- Unnamed Item
- Parallel collision search with cryptanalytic applications
- An efficient quantum collision search algorithm and implications on symmetric cryptography
- Integer linear programming for three-subset meet-in-the-middle attacks: application to GIFT
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
- Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound
- Quantum collision attacks on reduced SHA-256 and SHA-512
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
- Whirlwind: a new cryptographic hash function
- Quantum collision attacks on AES-like hashing with low quantum random access memories
- Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks
- Breaking Symmetric Cryptosystems Using Quantum Period Finding
- Limited-Birthday Distinguishers for Hash Functions
- Match Box Meet-in-the-Middle Attack Against KATAN
- Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl
- Quantum Random Access Memory
- Cryptanalysis of Reduced-Round Whirlwind
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- Second Preimage Analysis of Whirlwind
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- Preimage Attacks on 3, 4, and 5-Pass HAVAL
- Finding Preimages in Full MD5 Faster Than Exhaustive Search
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- Rebound Distinguishers: Results on the Full Whirlpool Compression Function
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Improved Rebound Attack on the Finalist Grøstl
- Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family
- Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks
- Automatic Search of Attacks on Round-Reduced AES and Applications
- Quantum cryptanalysis of hash and claw-free functions
- Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing
- Simplified MITM modeling for permutations: new (quantum) attacks
This page was built for publication: Improved attacks against reduced-round Whirlwind