Generic MitM attack frameworks on sponge constructions
From MaRDI portal
Publication:6652908
Recommendations
- Meet-in-the-middle preimage attacks on sponge-based hashing
- Diving deep into the preimage security of AES-like hashing
- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
- Automated meet-in-the-middle attack goes to Feistel
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
Cites work
- scientific article; zbMATH DE number 4195165 (Why is no real title available?)
- scientific article; zbMATH DE number 1024070 (Why is no real title available?)
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
- Automatic search of attacks on round-reduced AES and applications
- Automatic search of meet-in-the-middle and impossible differential attacks
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
- Biclique Cryptanalysis of the Full AES
- Bicliques for permutations: collision and preimage attacks in stronger settings
- Collision attacks on round-reduced SHA-3 using conditional internal differentials
- Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials
- Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2
- Cryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\)
- Differential meet-in-the-middle cryptanalysis
- Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems
- Finding Collisions in the Full SHA-1
- Finding Preimages in Full MD5 Faster Than Exhaustive Search
- Generic MitM attack frameworks on sponge constructions
- Higher-order differential meet-in-the-middle preimage attacks on SHA-1 and BLAKE
- How to Break MD5 and Other Hash Functions
- How to improve rebound attacks
- Improved Meet-in-the-Middle Attacks on Reduced-Round DES
- Integer linear programming for three-subset meet-in-the-middle attacks: application to GIFT
- Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks
- Match box meet-in-the-middle attack against KATAN
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
- Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool
- Meet-in-the-middle preimage attacks on sponge-based hashing
- Narrow-bicliques: cryptanalysis of full IDEA
- New attacks on Keccak-224 and Keccak-256
- New preimage attacks against reduced SHA-1
- Nondeterministic Algorithms
- Parallel collision search with cryptanalytic applications
- Practical collision attacks against round-reduced SHA-3
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- Sieve-in-the-middle: improved MITM attacks
- Simplified MITM modeling for permutations: new (quantum) attacks
- Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing
- The PHOTON family of lightweight hash functions
- The \textsf{Simeck} family of lightweight block ciphers
- Tight preimage resistance of the sponge construction
- \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing
Cited in
(3)
This page was built for publication: Generic MitM attack frameworks on sponge constructions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6652908)