Whirlpool
From MaRDI portal
Software:25254
No author found.
Related Items (45)
Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks ⋮ SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks ⋮ The Whirlpool Secure Hash Function ⋮ On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure ⋮ Whirlwind: a new cryptographic hash function ⋮ A structure-based chaotic hashing scheme ⋮ Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC ⋮ Construction of MDS matrices combining the Feistel, Misty and Lai-Massey schemes ⋮ Cryptanalysis of Reduced-Round Whirlwind ⋮ Unnamed Item ⋮ Practical Attacks on AES-like Cryptographic Hash Functions ⋮ Open problems in hash function security ⋮ Structural Evaluation by Generalized Integral Property ⋮ Cryptanalysis of GOST R hash function ⋮ On the distance from permutations to the union of all imprimitive groups with identical parameters of imprimitivity systems. ⋮ How (Not) to Efficiently Dither Blockcipher-Based Hash Functions? ⋮ Unnamed Item ⋮ Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation ⋮ Security of permutation-based compression function {\textsf{lp}}231 ⋮ New Applications of Differential Bounds of the SDS Structure ⋮ A Bit-Slice Implementation of the Whirlpool Hash Function ⋮ StriBob: аутентифицированное шифрование с помощью подстановки LPS из ГОСТ Р 34.11-2012 ⋮ Collisions of MMO-MD5 and Their Impact on Original MD5 ⋮ Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool ⋮ Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes ⋮ Construction, Randomness and Security of New Hash Functions Derived from Chaos Mappings ⋮ Rotation symmetry in algebraically generated cryptographic substitution tables ⋮ Interpreting Hash Function Security Proofs ⋮ Aperiodic propagation criteria for Boolean functions ⋮ The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition ⋮ On the Impossibility of Efficiently Combining Collision Resistant Hash Functions ⋮ Building indifferentiable compression functions from the PGV compression functions ⋮ On Feistel Structures Using a Diffusion Switching Mechanism ⋮ The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function ⋮ Construction of Lightweight S-Boxes Using Feistel and MISTY Structures ⋮ On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds ⋮ On the Diffusion of Generalized Feistel Structures Regarding Differential and Linear Cryptanalysis ⋮ Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1 ⋮ Experimental Verification of Super-Sbox Analysis — Confirmation of Detailed Attack Complexity ⋮ Rebound Attack on the Full Lane Compression Function ⋮ Rebound Distinguishers: Results on the Full Whirlpool Compression Function ⋮ Hash Functions and RFID Tags: Mind the Gap ⋮ Unnamed Item ⋮ The rebound attack and subspace distinguishers: application to Whirlpool ⋮ Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound
This page was built for software: Whirlpool