Whirlpool
From MaRDI portal
Software:25254
swMATH13339MaRDI QIDQ25254FDOQ25254
Author name not available (Why is that?)
Cited In (45)
- SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks
- A Bit-Slice Implementation of the Whirlpool Hash Function
- The rebound attack and subspace distinguishers: application to Whirlpool
- Cryptanalysis of GOST R hash function
- Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC
- Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes
- Title not available (Why is that?)
- Security of permutation-based compression function {\textsf{lp}}231
- The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition
- Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
- Rebound Attack on the Full Lane Compression Function
- Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
- Interpreting Hash Function Security Proofs
- Building indifferentiable compression functions from the PGV compression functions
- Structural Evaluation by Generalized Integral Property
- How (Not) to Efficiently Dither Blockcipher-Based Hash Functions?
- Whirlwind: a new cryptographic hash function
- Cryptanalysis of Reduced-Round Whirlwind
- Construction of Lightweight S-Boxes Using Feistel and MISTY Structures
- Aperiodic propagation criteria for Boolean functions
- On the Impossibility of Efficiently Combining Collision Resistant Hash Functions
- A structure-based chaotic hashing scheme
- StriBob: аутентифицированное шифрование с помощью подстановки LPS из ГОСТ Р 34.11-2012
- On the distance from permutations to the union of all imprimitive groups with identical parameters of imprimitivity systems.
- Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation
- Construction, Randomness and Security of New Hash Functions Derived from Chaos Mappings
- New Applications of Differential Bounds of the SDS Structure
- Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound
- Open problems in hash function security
- The Whirlpool Secure Hash Function
- On Feistel Structures Using a Diffusion Switching Mechanism
- Rebound Distinguishers: Results on the Full Whirlpool Compression Function
- Title not available (Why is that?)
- Practical Attacks on AES-like Cryptographic Hash Functions
- On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds
- Collisions of MMO-MD5 and Their Impact on Original MD5
- Hash Functions and RFID Tags: Mind the Gap
- Rotation symmetry in algebraically generated cryptographic substitution tables
- On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure
- Title not available (Why is that?)
- The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function
- On the Diffusion of Generalized Feistel Structures Regarding Differential and Linear Cryptanalysis
- Construction of MDS matrices combining the Feistel, Misty and Lai-Massey schemes
- Experimental Verification of Super-Sbox Analysis — Confirmation of Detailed Attack Complexity
This page was built for software: Whirlpool