Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl
- 1 January 2010
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 16 references indexed in Scilit:
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like PermutationsLecture Notes in Computer Science, 2010
- Rebound Attack on Reduced-Round Versions of JHLecture Notes in Computer Science, 2010
- Practical Rebound Attack on 12-Round Cheetah-256Lecture Notes in Computer Science, 2010
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and GrøstlLecture Notes in Computer Science, 2009
- Cryptanalysis of the LANE Hash FunctionLecture Notes in Computer Science, 2009
- Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block CipherLecture Notes in Computer Science, 2009
- Rebound Attack on the Full Lane Compression FunctionLecture Notes in Computer Science, 2009
- Cryptanalysis of GrindahlLecture Notes in Computer Science, 2007
- How to Break MD5 and Other Hash FunctionsLecture Notes in Computer Science, 2005
- The Design of RijndaelInformation Security and Cryptography, 2002