Whirlpool

From MaRDI portal
Software:25254



swMATH13339MaRDI QIDQ25254


No author found.





Related Items (45)

Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacksSPN-Hash: Improving the Provable Resistance against Differential Collision AttacksThe Whirlpool Secure Hash FunctionOn Reverse-Engineering S-Boxes with Hidden Design Criteria or StructureWhirlwind: a new cryptographic hash functionA structure-based chaotic hashing schemeGeneric State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMACConstruction of MDS matrices combining the Feistel, Misty and Lai-Massey schemesCryptanalysis of Reduced-Round WhirlwindUnnamed ItemPractical Attacks on AES-like Cryptographic Hash FunctionsOpen problems in hash function securityStructural Evaluation by Generalized Integral PropertyCryptanalysis of GOST R hash functionOn the distance from permutations to the union of all imprimitive groups with identical parameters of imprimitivity systems.How (Not) to Efficiently Dither Blockcipher-Based Hash Functions?Unnamed ItemAccelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical PermutationSecurity of permutation-based compression function {\textsf{lp}}231New Applications of Differential Bounds of the SDS StructureA Bit-Slice Implementation of the Whirlpool Hash FunctionStriBob: аутентифицированное шифрование с помощью подстановки LPS из ГОСТ Р 34.11-2012Collisions of MMO-MD5 and Their Impact on Original MD5Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to WhirlpoolKnown-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing ModesConstruction, Randomness and Security of New Hash Functions Derived from Chaos MappingsRotation symmetry in algebraically generated cryptographic substitution tablesInterpreting Hash Function Security ProofsAperiodic propagation criteria for Boolean functionsThe First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 CompetitionOn the Impossibility of Efficiently Combining Collision Resistant Hash FunctionsBuilding indifferentiable compression functions from the PGV compression functionsOn Feistel Structures Using a Diffusion Switching MechanismThe Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash FunctionConstruction of Lightweight S-Boxes Using Feistel and MISTY StructuresOn Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple RoundsOn the Diffusion of Generalized Feistel Structures Regarding Differential and Linear CryptanalysisReverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1Experimental Verification of Super-Sbox Analysis — Confirmation of Detailed Attack ComplexityRebound Attack on the Full Lane Compression FunctionRebound Distinguishers: Results on the Full Whirlpool Compression FunctionHash Functions and RFID Tags: Mind the GapUnnamed ItemThe rebound attack and subspace distinguishers: application to WhirlpoolFinding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound


This page was built for software: Whirlpool