Improved practical attacks on round-reduced Keccak
From MaRDI portal
Publication:744599
DOI10.1007/S00145-012-9142-5zbMATH Open1297.94064OpenAlexW2063663665MaRDI QIDQ744599FDOQ744599
Orr Dunkelman, Itai Dinur, Adi Shamir
Publication date: 25 September 2014
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-012-9142-5
Recommendations
- Algebraic Attacks on Round-Reduced Keccak
- Practical attacks on reduced-round AES
- New collision attacks on round-reduced Keccak
- Practical Analysis of Reduced-Round Keccak
- scientific article; zbMATH DE number 2089313
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities
- Improved meet-in-the-middle attacks on reduced round Kuznyechik
- Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC
Cites Work
- Keccak
- Higher-Order Differential Properties of Keccak and Luffa
- Fast software encryption. 16th international workshop, FSE 2009, Leuven, Belgium, February 22--25, 2009. Revised selected papers
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- Practical Analysis of Reduced-Round Keccak
- A SAT-based preimage analysis of reduced \textsc{Keccak} hash functions
- Unaligned Rebound Attack: Application to Keccak
- Algebraic Techniques in Differential Cryptanalysis
- Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19--21, 2012. Revised selected papers
- Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256
- Cryptanalysis of hash functions with structures
- Sponge-Based Pseudo-Random Number Generators
- Speeding up Collision Search for Byte-Oriented Hash Functions
- Differential Propagation Analysis of Keccak
Cited In (12)
- Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques
- Cryptanalysis of round-reduced KECCAK using non-linear structures
- Improved Distinguishing Attacks on HC-256
- Conditional Cube Attack on Reduced-Round Keccak Sponge Function
- New Collision Attacks on Round-Reduced Keccak
- Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak
- Improving key-recovery in linear attacks: application to 28-round PRESENT
- Exploring SAT for cryptanalysis: (quantum) collision attacks against 6-round SHA-3
- Practical Analysis of Reduced-Round Keccak
- Collision attacks on round-reduced SHA-3 using conditional internal differentials
- Probabilistic linearization: internal differential collisions in up to 6 rounds of SHA-3
- Practical collision attacks against round-reduced SHA-3
Uses Software
This page was built for publication: Improved practical attacks on round-reduced Keccak
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q744599)