Improved practical attacks on round-reduced Keccak
From MaRDI portal
Publication:744599
DOI10.1007/s00145-012-9142-5zbMath1297.94064OpenAlexW2063663665MaRDI QIDQ744599
Orr Dunkelman, Itai Dinur, Adi Shamir
Publication date: 25 September 2014
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-012-9142-5
Related Items (7)
Cryptanalysis of round-reduced KECCAK using non-linear structures ⋮ Collision attacks on round-reduced SHA-3 using conditional internal differentials ⋮ Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak ⋮ Exploring SAT for cryptanalysis: (quantum) collision attacks against 6-round SHA-3 ⋮ Conditional Cube Attack on Reduced-Round Keccak Sponge Function ⋮ Practical collision attacks against round-reduced SHA-3 ⋮ New Collision Attacks on Round-Reduced Keccak
Uses Software
Cites Work
- A SAT-based preimage analysis of reduced \textsc{Keccak} hash functions
- Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19--21, 2012. Revised selected papers
- Fast software encryption. 16th international workshop, FSE 2009, Leuven, Belgium, February 22--25, 2009. Revised selected papers
- Higher-Order Differential Properties of Keccak and Luffa
- Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256
- Practical Analysis of Reduced-Round Keccak
- Algebraic Techniques in Differential Cryptanalysis
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- Sponge-Based Pseudo-Random Number Generators
- Speeding up Collision Search for Byte-Oriented Hash Functions
- Cryptanalysis of Hash Functions with Structures
- Unaligned Rebound Attack: Application to Keccak
- Differential Propagation Analysis of Keccak
- Keccak
This page was built for publication: Improved practical attacks on round-reduced Keccak