Unaligned Rebound Attack: Application to Keccak
- 1 January 2012
- conference paper
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableThis publication has 14 references indexed in Scilit:
- Unaligned Rebound Attack: Application to KeccakLecture Notes in Computer Science, 2012
- How to Improve Rebound AttacksLecture Notes in Computer Science, 2011
- Higher-Order Differential Properties of Keccak and LuffaLecture Notes in Computer Science, 2011
- Cryptanalysis of Luffa v2 ComponentsLecture Notes in Computer Science, 2011
- Non-full-active Super-Sbox Analysis: Applications to ECHO and GrøstlLecture Notes in Computer Science, 2010
- Rotational Rebound Attacks on Reduced SkeinLecture Notes in Computer Science, 2010
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and GrøstlLecture Notes in Computer Science, 2009
- Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block CipherLecture Notes in Computer Science, 2009
- Rebound Distinguishers: Results on the Full Whirlpool Compression FunctionLecture Notes in Computer Science, 2009
- Finding Collisions in the Full SHA-1Lecture Notes in Computer Science, 2005