Improved practical attacks on round-reduced Keccak
From MaRDI portal
Publication:744599
DOI10.1007/S00145-012-9142-5zbMATH Open1297.94064OpenAlexW2063663665MaRDI QIDQ744599FDOQ744599
Authors: Itai Dinur, Orr Dunkelman, Adi Shamir
Publication date: 25 September 2014
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-012-9142-5
Recommendations
- Algebraic Attacks on Round-Reduced Keccak
- Practical attacks on reduced-round AES
- New collision attacks on round-reduced Keccak
- Practical Analysis of Reduced-Round Keccak
- scientific article; zbMATH DE number 2089313
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities
- Improved meet-in-the-middle attacks on reduced round Kuznyechik
- Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC
Cites Work
- Keccak
- Higher-order differential properties of Keccak and Luffa
- Fast software encryption. 16th international workshop, FSE 2009, Leuven, Belgium, February 22--25, 2009. Revised selected papers
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- Practical Analysis of Reduced-Round Keccak
- A SAT-based preimage analysis of reduced \textsc{Keccak} hash functions
- Unaligned rebound attack: application to Keccak
- Algebraic Techniques in Differential Cryptanalysis
- Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19--21, 2012. Revised selected papers
- Zero-sum distinguishers for iterated permutations and application to Keccak-\(f\) and Hamsi-256
- Cryptanalysis of hash functions with structures
- Sponge-based pseudo-random number generators
- Speeding up Collision Search for Byte-Oriented Hash Functions
- Differential Propagation Analysis of Keccak
Cited In (18)
- Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques
- Cryptanalysis of round-reduced KECCAK using non-linear structures
- Improved Distinguishing Attacks on HC-256
- Linear structures: applications to cryptanalysis of round-reduced \textsc{Keccak}
- New attacks on Keccak-224 and Keccak-256
- Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials
- Cryptanalysis of 1-round KECCAK
- Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function
- Conditional cube attack on reduced-round Keccak sponge function
- Improving key-recovery in linear attacks: application to 28-round PRESENT
- Exploring SAT for cryptanalysis: (quantum) collision attacks against 6-round SHA-3
- Practical Analysis of Reduced-Round Keccak
- Collision attacks on round-reduced SHA-3 using conditional internal differentials
- Non-full Sbox linearization: applications to collision attacks on round-reduced \textsc{keccak}
- New collision attacks on round-reduced Keccak
- Probabilistic linearization: internal differential collisions in up to 6 rounds of SHA-3
- Preimage attacks on round-reduced Keccak-224/256 via an allocating approach
- Practical collision attacks against round-reduced SHA-3
Uses Software
This page was built for publication: Improved practical attacks on round-reduced Keccak
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q744599)