Skein Hash
From MaRDI portal
Software:32296
swMATH20478MaRDI QIDQ32296FDOQ32296
Author name not available (Why is that?)
Cited In (34)
- Automatic differential analysis of ARX block ciphers with application to SPECK and LEA
- How to build fully secure tweakable blockciphers from classical blockciphers
- Tweaking Even-Mansour ciphers
- Authenticated encryption with small stretch (or, how to accelerate AERO)
- A measure of dependence for cryptographic primitives relative to ideal functions
- Differential characteristics of base operations in ARX-ciphers
- Impossible-differential and boomerang cryptanalysis of round-reduced Kiasu-BC
- Rotational rebound attacks on reduced Skein
- Collisions of MMO-MD5 and their impact on original MD5
- New second-preimage attacks on hash functions
- Lightweight implementations of SHA-3 candidates on FPGAs
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher
- Automatic search of linear trails in ARX with applications to SPECK and Chaskey
- The differential analysis of S-functions
- Introducing the counter mode of operation to compressed sensing based encryption
- Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model
- Вероятностные характеристики разностных и линейных соотношений для неоднородной линейной среды
- \textsc{POEx}: a beyond-birthday-bound-secure on-line cipher
- Open problems in hash function security
- The DBlock family of block ciphers
- The boomerang attacks on the round-reduced Skein-512
- Improved generic attacks against hash-based MACs and HAIFA
- Expedient Non-malleability Notions for Hash Functions
- Feistel-inspired scrambling improves the quality of linear congruential generators
- The Additive Differential Probability of ARX
- Building blockcipher from tweakable blockcipher: extending FSE 2009 proposal
- Differential property of \textsc{Present}-like structure
- Extracts from the SHA-3 competition
- Provable Security of BLAKE with Non-ideal Compression Function
- On the Security of Hash Functions Employing Blockcipher Postprocessing
- McOE: a family of almost foolproof on-line authenticated encryption schemes
- Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK
- Boomerang Attacks on Hash Function Using Auxiliary Differentials
This page was built for software: Skein Hash