Recommendations
- Rotational Rebound Attacks on Reduced Skein
- The boomerang attacks on the round-reduced Skein-512
- scientific article; zbMATH DE number 2089130
- A Note on Twist Spun Knots
- ON THE REVERSIBILITY OF TWIST-SPUN KNOTS
- Reidemeister torsion in knot theory
- Impossible differential attack on reduced-round TWINE
- On twisted knots
- Partial-collision attack on the round-reduced compression function of Skein-256
Cites work
- Advances in Cryptology – CRYPTO 2004
- Analysis of Step-Reduced SHA-256
- Biclique Cryptanalysis of the Full AES
- Bicliques for permutations: collision and preimage attacks in stronger settings
- Bicliques for preimages: attacks on Skein-512 and the SHA-2 family
- Boomerang Attacks on Hash Function Using Auxiliary Differentials
- Collisions and Other Non-random Properties for Step-Reduced SHA-256
- Collisions for Step-Reduced SHA-256
- Collisions of SHA-0 and Reduced SHA-1
- Construction of differential characteristics in ARX designs application to Skein
- Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2
- Cryptanalysis of Luffa v2 components
- Cryptanalysis of hash functions on the MD4-family.
- Distinguisher and Related-Key Attack on the Full AES-256
- Finding Collisions in the Full SHA-1
- Finding SHA-2 characteristics: searching through a minefield of contradictions
- Hash Functions and the (Amplified) Boomerang Attack
- How to Break MD5 and Other Hash Functions
- Improved Collision Search for SHA-0
- Improved analysis of ECHO-256
- Improved cryptanalysis of Skein
- Improved cryptanalysis of the reduced Grøstl compression function, ECHO permutation and AES block cipher
- Improved rebound attack on the finalist Grøstl
- Keccak
- Known-key distinguishers on 11-round Feistel and collision attacks on its hashing modes
- Near-collisions on the reduced-round compression functions of Skein and BLAKE
- Partial-collision attack on the round-reduced compression function of Skein-256
- Rebound attack on the full Lane compression function
- Rebound distinguishers: results on the full Whirlpool compression function
- Rotational Rebound Attacks on Reduced Skein
- Rotational cryptanalysis of ARX
- Rotational cryptanalysis of round-reduced \textsc{Keccak}
- SEA: A Scalable Encryption Algorithm for Small Embedded Applications
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- Topics in Cryptology – CT-RSA 2005
- Unaligned rebound attack: application to Keccak
Cited in
(7)- Deep learning-based rotational-XOR distinguishers for AND-RX block ciphers: evaluations on Simeck and Simon
- Rotational cryptanalysis of ARX
- Partial-collision attack on the round-reduced compression function of Skein-256
- Improved cryptanalysis of Skein
- Triangulating rebound attack on AES-like hashing
- The boomerang attacks on the round-reduced Skein-512
- Rotational Rebound Attacks on Reduced Skein
This page was built for publication: Rotational rebound attacks on reduced Skein
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q744348)