Whirlpool
From MaRDI portal
Software:25254
swMATH13339MaRDI QIDQ25254FDOQ25254
Author name not available (Why is that?)
Cited In (45)
- SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks
- A Bit-Slice Implementation of the Whirlpool Hash Function
- The rebound attack and subspace distinguishers: application to Whirlpool
- Cryptanalysis of GOST R hash function
- Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC
- Title not available (Why is that?)
- Security of permutation-based compression function {\textsf{lp}}231
- Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
- Rebound distinguishers: results on the full Whirlpool compression function
- Building indifferentiable compression functions from the PGV compression functions
- Structural Evaluation by Generalized Integral Property
- How (Not) to Efficiently Dither Blockcipher-Based Hash Functions?
- Whirlwind: a new cryptographic hash function
- Cryptanalysis of Reduced-Round Whirlwind
- Construction of Lightweight S-Boxes Using Feistel and MISTY Structures
- Aperiodic propagation criteria for Boolean functions
- On the Impossibility of Efficiently Combining Collision Resistant Hash Functions
- The first 30 years of cryptographic hash functions and the NIST SHA-3 competition
- Collisions of MMO-MD5 and their impact on original MD5
- A structure-based chaotic hashing scheme
- StriBob: аутентифицированное шифрование с помощью подстановки LPS из ГОСТ Р 34.11-2012
- On the distance from permutations to the union of all imprimitive groups with identical parameters of imprimitivity systems.
- Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation
- Construction, Randomness and Security of New Hash Functions Derived from Chaos Mappings
- New Applications of Differential Bounds of the SDS Structure
- Experimental verification of super-Sbox analysis -- confirmation of detailed attack complexity
- Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound
- Open problems in hash function security
- Interpreting hash function security proofs
- The Whirlpool Secure Hash Function
- On Feistel Structures Using a Diffusion Switching Mechanism
- Title not available (Why is that?)
- Practical Attacks on AES-like Cryptographic Hash Functions
- On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds
- Hash Functions and RFID Tags: Mind the Gap
- Rebound attack on the full Lane compression function
- Known-key distinguishers on 11-round Feistel and collision attacks on its hashing modes
- Rotation symmetry in algebraically generated cryptographic substitution tables
- On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure
- Title not available (Why is that?)
- The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function
- Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool
- On the Diffusion of Generalized Feistel Structures Regarding Differential and Linear Cryptanalysis
- Construction of MDS matrices combining the Feistel, Misty and Lai-Massey schemes
This page was built for software: Whirlpool