Differential Biases in Reduced-Round Keccak
- 1 January 2014
- conference paper
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableThis publication has 14 references indexed in Scilit:
- Rotational Cryptanalysis of Round-Reduced KeccakLecture Notes in Computer Science, 2014
- Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal DifferentialsPublished by Springer Science and Business Media LLC ,2014
- Third-Round Report of the SHA-3 Cryptographic Hash Algorithm CompetitionPublished by National Institute of Standards and Technology (NIST) ,2012
- New Attacks on Keccak-224 and Keccak-256Lecture Notes in Computer Science, 2012
- Differential Propagation Analysis of KeccakLecture Notes in Computer Science, 2012
- Unaligned Rebound Attack: Application to KeccakLecture Notes in Computer Science, 2012
- Practical Analysis of Reduced-Round KeccakLecture Notes in Computer Science, 2011
- Higher-Order Differential Properties of Keccak and LuffaLecture Notes in Computer Science, 2011
- Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256Lecture Notes in Computer Science, 2011
- Random oracles are practicalPublished by Association for Computing Machinery (ACM) ,1993