Generic MitM attack frameworks on sponge constructions
From MaRDI portal
Publication:6652908
DOI10.1007/978-3-031-68385-5_1MaRDI QIDQ6652908FDOQ6652908
Authors: Xiaoyang Dong, Boxin Zhao, Lingyue Qin, Qingliang Hou, S. Zhang, Xiaoyun Wang
Publication date: 13 December 2024
Recommendations
- Meet-in-the-middle preimage attacks on sponge-based hashing
- Diving deep into the preimage security of AES-like hashing
- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
- Automated meet-in-the-middle attack goes to Feistel
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
Cites Work
- Title not available (Why is that?)
- Nondeterministic Algorithms
- Parallel collision search with cryptanalytic applications
- Biclique Cryptanalysis of the Full AES
- Finding Collisions in the Full SHA-1
- Finding Preimages in Full MD5 Faster Than Exhaustive Search
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- Title not available (Why is that?)
- Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2
- Bicliques for permutations: collision and preimage attacks in stronger settings
- How to Break MD5 and Other Hash Functions
- Narrow-bicliques: cryptanalysis of full IDEA
- New attacks on Keccak-224 and Keccak-256
- Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- New preimage attacks against reduced SHA-1
- Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool
- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
- Improved Meet-in-the-Middle Attacks on Reduced-Round DES
- How to improve rebound attacks
- The PHOTON family of lightweight hash functions
- Automatic search of attacks on round-reduced AES and applications
- The \textsf{Simeck} family of lightweight block ciphers
- Sieve-in-the-middle: improved MITM attacks
- Integer linear programming for three-subset meet-in-the-middle attacks: application to GIFT
- Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials
- \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing
- Cryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\)
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
- Automatic search of meet-in-the-middle and impossible differential attacks
- Higher-order differential meet-in-the-middle preimage attacks on SHA-1 and BLAKE
- Meet-in-the-middle preimage attacks on sponge-based hashing
- Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing
- Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
- Match box meet-in-the-middle attack against KATAN
- Practical collision attacks against round-reduced SHA-3
- Collision attacks on round-reduced SHA-3 using conditional internal differentials
- Simplified MITM modeling for permutations: new (quantum) attacks
- Tight preimage resistance of the sponge construction
- Differential meet-in-the-middle cryptanalysis
- Generic MitM attack frameworks on sponge constructions
Cited In (3)
This page was built for publication: Generic MitM attack frameworks on sponge constructions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6652908)