Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing
From MaRDI portal
Publication:6097257
DOI10.1007/978-3-031-15802-5_3zbMath1516.94022OpenAlexW4312254418MaRDI QIDQ6097257
Jian Guo, Zhenzhen Bao, Yi Tu, Danping Shi
Publication date: 12 June 2023
Published in: Advances in Cryptology – CRYPTO 2022 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-15802-5_3
Related Items
Improved attacks against reduced-round Whirlwind, Exploiting non-full key additions: full-fledged automatic Demirci-Selçuk meet-in-the-middle cryptanalysis of SKINNY, Meet-in-the-middle preimage attacks on sponge-based hashing, Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}
Cites Work
- Unnamed Item
- Unnamed Item
- Improved (pseudo) preimage attacks on reduced-round \texttt{GOST} and \texttt{Grøstl-256} and studies on several truncation patterns for \texttt{AES}-like compression functions
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
- Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers
- Match Box Meet-in-the-Middle Attack Against KATAN
- Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- Preimage Attacks on Step-Reduced MD5
- MD4 is Not One-Way
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- Preimage Attacks on 3, 4, and 5-Pass HAVAL
- Finding Preimages in Full MD5 Faster Than Exhaustive Search
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
- Rebound Distinguishers: Results on the Full Whirlpool Compression Function
- (Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others
- Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2
- Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks
- Automatic Search of Attacks on Round-Reduced AES and Applications
- New Guess-and-Determine Attack on the Self-Shrinking Generator