Skein Hash
From MaRDI portal
Cited in
(56)- Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model
- Expedient Non-malleability Notions for Hash Functions
- Authenticated encryption with small stretch (or, how to accelerate AERO)
- McOE: a family of almost foolproof on-line authenticated encryption schemes
- The differential analysis of S-functions
- Impossible-differential and boomerang cryptanalysis of round-reduced Kiasu-BC
- Chaskey
- How to build fully secure tweakable blockciphers from classical blockciphers
- Feistel-inspired scrambling improves the quality of linear congruential generators
- The DBlock family of block ciphers
- Extracts from the SHA-3 competition
- Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher
- Improved generic attacks against hash-based MACs and HAIFA
- Automatic search of linear trails in ARX with applications to SPECK and Chaskey
- Introducing the counter mode of operation to compressed sensing based encryption
- Automatic differential analysis of ARX block ciphers with application to SPECK and LEA
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- Rotational rebound attacks on reduced Skein
- Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK
- Boomerang Attacks on Hash Function Using Auxiliary Differentials
- HAVAL
- MCBC
- Salsa20
- ChaCha
- CubeHash
- AESNI
- ARXtools
- Keccak
- BLAKE
- tweakey
- DBlock
- Provable Security of BLAKE with Non-ideal Compression Function
- COBRA
- Differential property of \textsc{Present}-like structure
- McOE
- ELmE
- OleF
- POEx
- CHAM
- LEA
- MMH
- A measure of dependence for cryptographic primitives relative to ideal functions
- XTEA
- The boomerang attacks on the round-reduced Skein-512
- Minalpher
- Collisions of MMO-MD5 and their impact on original MD5
- Вероятностные характеристики разностных и линейных соотношений для неоднородной линейной среды
- The Additive Differential Probability of ARX
- \textsc{POEx}: a beyond-birthday-bound-secure on-line cipher
- Lightweight implementations of SHA-3 candidates on FPGAs
- New second-preimage attacks on hash functions
- Tweaking Even-Mansour ciphers
- Open problems in hash function security
- On the Security of Hash Functions Employing Blockcipher Postprocessing
- Building blockcipher from tweakable blockcipher: extending FSE 2009 proposal
- Differential characteristics of base operations in ARX-ciphers
This page was built for software: Skein Hash