Skein Hash
From MaRDI portal
Software:32296
swMATH20478MaRDI QIDQ32296FDOQ32296
Author name not available (Why is that?)
Cited In (34)
- The Boomerang Attacks on the Round-Reduced Skein-512
- Building Blockcipher from Tweakable Blockcipher: Extending FSE 2009 Proposal
- Extracts from the SHA-3 Competition
- Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA
- A measure of dependence for cryptographic primitives relative to ideal functions
- How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers
- Rotational rebound attacks on reduced Skein
- New second-preimage attacks on hash functions
- McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes
- Authenticated Encryption with Small Stretch (or, How to Accelerate AERO)
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher
- Introducing the counter mode of operation to compressed sensing based encryption
- Tweaking Even-Mansour Ciphers
- Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model
- Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC
- Вероятностные характеристики разностных и линейных соотношений для неоднородной линейной среды
- Разностные характеристики основных операций ARX-шифров
- \textsc{POEx}: a beyond-birthday-bound-secure on-line cipher
- Open problems in hash function security
- The DBlock family of block ciphers
- Improved generic attacks against hash-based MACs and HAIFA
- Expedient Non-malleability Notions for Hash Functions
- Feistel-inspired scrambling improves the quality of linear congruential generators
- Collisions of MMO-MD5 and Their Impact on Original MD5
- The Additive Differential Probability of ARX
- Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey
- Lightweight Implementations of SHA-3 Candidates on FPGAs
- Differential property of \textsc{Present}-like structure
- Provable Security of BLAKE with Non-ideal Compression Function
- The Differential Analysis of S-Functions
- On the Security of Hash Functions Employing Blockcipher Postprocessing
- Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK
- Boomerang Attacks on Hash Function Using Auxiliary Differentials
This page was built for software: Skein Hash