Rotational rebound attacks on reduced Skein
From MaRDI portal
Publication:744348
DOI10.1007/S00145-013-9150-0zbMATH Open1302.94053OpenAlexW1965262782MaRDI QIDQ744348FDOQ744348
Authors: Dmitry Khovratovich, Ivica Nikolić, Christian Rechberger
Publication date: 25 September 2014
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://lirias.kuleuven.be/handle/123456789/280784
Recommendations
- Rotational Rebound Attacks on Reduced Skein
- The boomerang attacks on the round-reduced Skein-512
- scientific article; zbMATH DE number 2089130
- A Note on Twist Spun Knots
- ON THE REVERSIBILITY OF TWIST-SPUN KNOTS
- Reidemeister torsion in knot theory
- Impossible differential attack on reduced-round TWINE
- On twisted knots
- Partial-collision attack on the round-reduced compression function of Skein-256
hash functionciphercompression functiondistinguisherrebound attackSHA-3rotational cryptanalysisSkein
Cites Work
- Keccak
- Biclique Cryptanalysis of the Full AES
- Distinguisher and Related-Key Attack on the Full AES-256
- Finding Collisions in the Full SHA-1
- Known-key distinguishers on 11-round Feistel and collision attacks on its hashing modes
- Finding SHA-2 characteristics: searching through a minefield of contradictions
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- Hash Functions and the (Amplified) Boomerang Attack
- Rebound attack on the full Lane compression function
- Improved cryptanalysis of the reduced Grøstl compression function, ECHO permutation and AES block cipher
- Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2
- Bicliques for permutations: collision and preimage attacks in stronger settings
- How to Break MD5 and Other Hash Functions
- Collisions of SHA-0 and Reduced SHA-1
- Rotational Rebound Attacks on Reduced Skein
- Rebound distinguishers: results on the full Whirlpool compression function
- Bicliques for preimages: attacks on Skein-512 and the SHA-2 family
- Unaligned rebound attack: application to Keccak
- SEA: A Scalable Encryption Algorithm for Small Embedded Applications
- Cryptanalysis of hash functions on the MD4-family.
- Improved analysis of ECHO-256
- Improved rebound attack on the finalist Grøstl
- Construction of differential characteristics in ARX designs application to Skein
- Boomerang Attacks on Hash Function Using Auxiliary Differentials
- Rotational cryptanalysis of round-reduced \textsc{Keccak}
- Partial-collision attack on the round-reduced compression function of Skein-256
- Near-collisions on the reduced-round compression functions of Skein and BLAKE
- Cryptanalysis of Luffa v2 components
- Collisions for Step-Reduced SHA-256
- Rotational cryptanalysis of ARX
- Analysis of Step-Reduced SHA-256
- Collisions and Other Non-random Properties for Step-Reduced SHA-256
- Improved cryptanalysis of Skein
- Advances in Cryptology – CRYPTO 2004
- Improved Collision Search for SHA-0
- Topics in Cryptology – CT-RSA 2005
Cited In (7)
- Deep learning-based rotational-XOR distinguishers for AND-RX block ciphers: evaluations on Simeck and Simon
- Triangulating rebound attack on AES-like hashing
- Rotational Rebound Attacks on Reduced Skein
- Improved cryptanalysis of Skein
- Rotational cryptanalysis of ARX
- Partial-collision attack on the round-reduced compression function of Skein-256
- The boomerang attacks on the round-reduced Skein-512
Uses Software
This page was built for publication: Rotational rebound attacks on reduced Skein
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q744348)