Triangulating rebound attack on AES-like hashing
From MaRDI portal
Publication:6097258
DOI10.1007/978-3-031-15802-5_4zbMath1516.94028OpenAlexW4312301050MaRDI QIDQ6097258
Shun Li, Jian Guo, Phuong Nguyen Pham, Xiaoyang Dong
Publication date: 12 June 2023
Published in: Advances in Cryptology – CRYPTO 2022 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-15802-5_4
triangulation algorithmcollision attacksquantum attackrebound attackssuper-inboundtriangulating rebound
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Rotational rebound attacks on reduced Skein
- On quantum slide attacks
- Parallel collision search with cryptanalytic applications
- Quantum algorithms for the \(k\)-XOR problem
- The first collision for full SHA-1
- Grover meets Simon -- quantumly attacking the FX-construction
- Quantum multicollision-finding algorithm
- An efficient quantum collision search algorithm and implications on symmetric cryptography
- Low-communication parallel quantum multi-target preimage search
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
- Cryptanalysis results on spook. Bringing full-round shadow-512 to the light
- Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound
- Optimal merging in quantum \(k\)-xor and \(k\)-sum algorithms
- Quantum collision attacks on reduced SHA-256 and SHA-512
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
- Quantum attacks without superposition queries: the offline Simon's algorithm
- Quantum attacks on some Feistel block ciphers
- Cryptanalysis against symmetric-key schemes with online classical queries and offline quantum computations
- On finding quantum multi-collisions
- Improved quantum multicollision-finding algorithm
- Quantum collision attacks on AES-like hashing with low quantum random access memories
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Breaking Symmetric Cryptosystems Using Quantum Period Finding
- Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications
- Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems
- Collision Attack on 5 Rounds of Grøstl
- Multiple Limited-Birthday Distinguishers and Applications
- Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
- Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
- Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl
- Improved Single-Key Attacks on 8-Round AES-192 and AES-256
- Rebound Attack on JH42
- Biclique Cryptanalysis of the Full AES
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- The Grindahl Hash Functions
- Understanding Two-Round Differentials in AES
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- Speeding up Collision Search for Byte-Oriented Hash Functions
- Rebound Attack on the Full Lane Compression Function
- Rebound Distinguishers: Results on the Full Whirlpool Compression Function
- Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher
- Improved Rebound Attack on the Finalist Grøstl
- Unaligned Rebound Attack: Application to Keccak
- Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks
- Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
- Rebound Attacks on the Reduced Grøstl Hash Function
- How to Improve Rebound Attacks
- How to Break MD5 and Other Hash Functions
- Finding Collisions in the Full SHA-1
- Quantum cryptanalysis of hash and claw-free functions
- Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials
This page was built for publication: Triangulating rebound attack on AES-like hashing