Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials
- 8 July 2014
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC
Abstract
No abstract availableKeywords
This publication has 16 references indexed in Scilit:
- Differential Propagation Analysis of KeccakLecture Notes in Computer Science, 2012
- Unaligned Rebound Attack: Application to KeccakLecture Notes in Computer Science, 2012
- A Cryptanalysis of PRINTcipher: The Invariant Subspace AttackLecture Notes in Computer Science, 2011
- Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256Lecture Notes in Computer Science, 2011
- Improved Differential Attacks for ECHO and GrøstlLecture Notes in Computer Science, 2010
- On the Indifferentiability of the Sponge ConstructionLecture Notes in Computer Science, 2008
- Complementation-Like and Cyclic Properties of AES Round FunctionsLecture Notes in Computer Science, 2005
- Slide AttacksLecture Notes in Computer Science, 1999
- Partitioning cryptanalysisLecture Notes in Computer Science, 1997
- New types of cryptanalytic attacks using related keysJournal of Cryptology, 1994