Rotational rebound attacks on reduced Skein
From MaRDI portal
Publication:744348
DOI10.1007/S00145-013-9150-0zbMATH Open1302.94053OpenAlexW1965262782MaRDI QIDQ744348FDOQ744348
Dmitry Khovratovich, Christian Rechberger, Ivica Nikolić
Publication date: 25 September 2014
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://lirias.kuleuven.be/handle/123456789/280784
Recommendations
- Rotational Rebound Attacks on Reduced Skein
- The boomerang attacks on the round-reduced Skein-512
- scientific article; zbMATH DE number 2089130
- A Note on Twist Spun Knots
- ON THE REVERSIBILITY OF TWIST-SPUN KNOTS
- Reidemeister torsion in knot theory
- Impossible differential attack on reduced-round TWINE
- On twisted knots
- Partial-collision attack on the round-reduced compression function of Skein-256
hash functionciphercompression functiondistinguisherrebound attackSHA-3rotational cryptanalysisSkein
Cites Work
- Keccak
- Biclique Cryptanalysis of the Full AES
- Distinguisher and Related-Key Attack on the Full AES-256
- Finding Collisions in the Full SHA-1
- Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes
- Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- Hash Functions and the (Amplified) Boomerang Attack
- Rebound Attack on the Full Lane Compression Function
- Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher
- Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2
- Bicliques for Permutations: Collision and Preimage Attacks in Stronger Settings
- How to Break MD5 and Other Hash Functions
- Collisions of SHA-0 and Reduced SHA-1
- Rotational Rebound Attacks on Reduced Skein
- Rebound Distinguishers: Results on the Full Whirlpool Compression Function
- Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family
- Unaligned Rebound Attack: Application to Keccak
- SEA: A Scalable Encryption Algorithm for Small Embedded Applications
- Title not available (Why is that?)
- Improved Analysis of ECHO-256
- Improved Rebound Attack on the Finalist Grøstl
- Construction of Differential Characteristics in ARX Designs Application to Skein
- Boomerang Attacks on Hash Function Using Auxiliary Differentials
- Rotational Cryptanalysis of Round-Reduced Keccak
- Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256
- Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE
- Cryptanalysis of Luffa v2 Components
- Collisions for Step-Reduced SHA-256
- Rotational Cryptanalysis of ARX
- Analysis of Step-Reduced SHA-256
- Collisions and Other Non-random Properties for Step-Reduced SHA-256
- Improved Cryptanalysis of Skein
- Advances in Cryptology – CRYPTO 2004
- Improved Collision Search for SHA-0
- Topics in Cryptology – CT-RSA 2005
Cited In (3)
Uses Software
This page was built for publication: Rotational rebound attacks on reduced Skein
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q744348)