Practical Analysis of Reduced-Round Keccak
- 1 January 2011
- conference paper
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableThis publication has 9 references indexed in Scilit:
- How to Improve Rebound AttacksLecture Notes in Computer Science, 2011
- Higher-Order Differential Properties of Keccak and LuffaLecture Notes in Computer Science, 2011
- Conditional Differential Cryptanalysis of NLFSR-Based CryptosystemsLecture Notes in Computer Science, 2010
- Near-Collisions for the Reduced Round Versions of Some Second Round SHA-3 Compression Functions Using Hill ClimbingLecture Notes in Computer Science, 2010
- On the Indifferentiability of the Sponge ConstructionLecture Notes in Computer Science, 2008
- On Authentication with HMAC and Non-random PropertiesLecture Notes in Computer Science, 2007
- Finding Collisions in the Full SHA-1Lecture Notes in Computer Science, 2005
- How to Break MD5 and Other Hash FunctionsLecture Notes in Computer Science, 2005
- Near-Collisions of SHA-0Lecture Notes in Computer Science, 2004