Collision attack on Grindahl
From MaRDI portal
Publication:901374
DOI10.1007/S00145-014-9186-9zbMATH Open1332.94076OpenAlexW2094614698MaRDI QIDQ901374FDOQ901374
Authors: Thomas Peyrin
Publication date: 11 January 2016
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-014-9186-9
Recommendations
- Internal differential collision attacks on the reduced-round Grøstl-0 hash function
- Multicollision attacks and generalized iterated hash functions
- Near collision attack on the Grain v1 stream cipher
- Improved collision attacks on the reduced-round Grøstl hash function
- Cryptography and Coding
- New collision attacks on round-reduced Keccak
- Horizontal collision correlation attack on elliptic curves
- Horizontal collision correlation attack on elliptic curves
- Collision attacks against the Knudsen-Preneel compression functions
- Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection
Cites Work
- Keccak
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Herding Hash Functions and the Nostradamus Attack
- Advances in Cryptology – CRYPTO 2004
- Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work
- Multi-Property-Preserving Hash Domain Extension and the EMD Transform
- Finding Collisions in the Full SHA-1
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- Improved cryptanalysis of the reduced Grøstl compression function, ECHO permutation and AES block cipher
- Title not available (Why is that?)
- Cryptanalysis of the Hash Functions MD4 and RIPEMD
- How to Break MD5 and Other Hash Functions
- Efficient Collision Search Attacks on SHA-0
- VSH, an Efficient and Provable Collision-Resistant Hash Function
- Rebound distinguishers: results on the full Whirlpool compression function
- Progress in Cryptology – Mycrypt 2005
- Cryptanalysis of Grindahl
- The Grindahl Hash Functions
- Some Plausible Constructions of Double-Block-Length Hash Functions
- Combining Compression Functions and Block Cipher-Based Hash Functions
- Cryptanalysis of hash functions with structures
- On Building Hash Functions from Multivariate Quadratic Equations
- The Hash Function Family LAKE
- Cryptanalysis of RadioGatún
- Security Analysis of Constructions Combining FIL Random Oracles
- Slide Attacks on a Class of Hash Functions
- A New Dedicated 256-Bit Hash Function: FORK-256
Cited In (3)
Uses Software
This page was built for publication: Collision attack on \({\mathtt Grindahl}\)
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q901374)