Whirlpool
From MaRDI portal
Software:25254
swMATH13339MaRDI QIDQ25254FDOQ25254
Author name not available (Why is that?)
Cited In (45)
- Reverse-engineering the S-Bbox of Streebog, Kuznyechik and Stribobr1
- SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks
- A Bit-Slice Implementation of the Whirlpool Hash Function
- The rebound attack and subspace distinguishers: application to Whirlpool
- Cryptanalysis of GOST R hash function
- Title not available (Why is that?)
- Cryptanalysis of reduced-round Whirlwind
- Security of permutation-based compression function {\textsf{lp}}231
- Structural evaluation by generalized integral property
- Construction of lightweight S-boxes using Feistel and MISTY structures
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
- Rebound distinguishers: results on the full Whirlpool compression function
- Building indifferentiable compression functions from the PGV compression functions
- The whirlpool secure hash function
- How (Not) to Efficiently Dither Blockcipher-Based Hash Functions?
- Whirlwind: a new cryptographic hash function
- Aperiodic propagation criteria for Boolean functions
- On the Impossibility of Efficiently Combining Collision Resistant Hash Functions
- The first 30 years of cryptographic hash functions and the NIST SHA-3 competition
- Collisions of MMO-MD5 and their impact on original MD5
- A structure-based chaotic hashing scheme
- Practical attacks on AES-like cryptographic hash functions
- StriBob: аутентифицированное шифрование с помощью подстановки LPS из ГОСТ Р 34.11-2012
- On the distance from permutations to the union of all imprimitive groups with identical parameters of imprimitivity systems.
- Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation
- New Applications of Differential Bounds of the SDS Structure
- Experimental verification of super-Sbox analysis -- confirmation of detailed attack complexity
- Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound
- Open problems in hash function security
- Interpreting hash function security proofs
- On Feistel Structures Using a Diffusion Switching Mechanism
- Title not available (Why is that?)
- On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds
- Generic state-recovery and forgery attacks on chopmd-MAC and on NMAC/HMAC
- Hash Functions and RFID Tags: Mind the Gap
- Rebound attack on the full Lane compression function
- Known-key distinguishers on 11-round Feistel and collision attacks on its hashing modes
- Rotation symmetry in algebraically generated cryptographic substitution tables
- On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure
- Title not available (Why is that?)
- The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function
- Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool
- On the Diffusion of Generalized Feistel Structures Regarding Differential and Linear Cryptanalysis
- Construction of MDS matrices combining the Feistel, Misty and Lai-Massey schemes
- Construction, randomness and security of new hash functions derived from chaos mappings
This page was built for software: Whirlpool