Collision attack on Grindahl
From MaRDI portal
Publication:901374
Recommendations
- Internal differential collision attacks on the reduced-round Grøstl-0 hash function
- Multicollision attacks and generalized iterated hash functions
- Near collision attack on the Grain v1 stream cipher
- Improved collision attacks on the reduced-round Grøstl hash function
- Cryptography and Coding
- New collision attacks on round-reduced Keccak
- Horizontal collision correlation attack on elliptic curves
- Horizontal collision correlation attack on elliptic curves
- Collision attacks against the Knudsen-Preneel compression functions
- Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection
Cites work
- scientific article; zbMATH DE number 1682693 (Why is no real title available?)
- scientific article; zbMATH DE number 4195165 (Why is no real title available?)
- scientific article; zbMATH DE number 1024070 (Why is no real title available?)
- scientific article; zbMATH DE number 1942429 (Why is no real title available?)
- scientific article; zbMATH DE number 1455090 (Why is no real title available?)
- scientific article; zbMATH DE number 954401 (Why is no real title available?)
- A New Dedicated 256-Bit Hash Function: FORK-256
- Advances in Cryptology – CRYPTO 2004
- Combining Compression Functions and Block Cipher-Based Hash Functions
- Cryptanalysis of Grindahl
- Cryptanalysis of RadioGatún
- Cryptanalysis of hash functions with structures
- Cryptanalysis of the Hash Functions MD4 and RIPEMD
- Efficient Collision Search Attacks on SHA-0
- Finding Collisions in the Full SHA-1
- Herding Hash Functions and the Nostradamus Attack
- How to Break MD5 and Other Hash Functions
- Improved cryptanalysis of the reduced Grøstl compression function, ECHO permutation and AES block cipher
- Keccak
- Multi-Property-Preserving Hash Domain Extension and the EMD Transform
- On Building Hash Functions from Multivariate Quadratic Equations
- Progress in Cryptology – Mycrypt 2005
- Rebound distinguishers: results on the full Whirlpool compression function
- Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work
- Security Analysis of Constructions Combining FIL Random Oracles
- Slide Attacks on a Class of Hash Functions
- Some Plausible Constructions of Double-Block-Length Hash Functions
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- The Grindahl Hash Functions
- The Hash Function Family LAKE
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- VSH, an Efficient and Provable Collision-Resistant Hash Function
Cited in
(4)
This page was built for publication: Collision attack on \({\mathtt Grindahl}\)
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q901374)