The following pages link to How to Improve Rebound Attacks (Q5199191):
Displaying 13 items.
- Improved cryptanalysis of AES-like permutations (Q484330) (← links)
- Quantum algorithms for the \(k\)-XOR problem (Q1633472) (← links)
- Some results on Fruit (Q1727353) (← links)
- Efficient dissection of bicomposite problems with cryptanalytic applications (Q2010595) (← links)
- The rebound attack and subspace distinguishers: application to Whirlpool (Q2344049) (← links)
- Quantum collision attacks on AES-like hashing with low quantum random access memories (Q2692403) (← links)
- Improved Analysis of ECHO-256 (Q2889861) (← links)
- A New Algorithm for the Unbalanced Meet-in-the-Middle Problem (Q2958141) (← links)
- Practical Analysis of Reduced-Round Keccak (Q3104737) (← links)
- LHash: A Lightweight Hash Function (Q3454161) (← links)
- Cryptanalysis of Full Sprout (Q3457133) (← links)
- A generic algorithm for efficient key recovery in differential attacks -- and its associated tool (Q6636390) (← links)
- Generic MitM attack frameworks on sponge constructions (Q6652908) (← links)