New Attacks on Keccak-224 and Keccak-256
暂无分享,去创建一个
[1] Vincent Rijmen,et al. Plateau Characteristics and AES , 2007 .
[2] Florian Mendel,et al. The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl , 2009, FSE.
[3] Dmitry Khovratovich,et al. Cryptanalysis of Hash Functions with Structures , 2009, Selected Areas in Cryptography.
[4] Alex Biryukov,et al. Speeding up Collision Search for Byte-Oriented Hash Functions , 2009, CT-RSA.
[5] Anne Canteaut,et al. Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256 , 2010, Selected Areas in Cryptography.
[6] María Naya-Plasencia,et al. Practical Analysis of Reduced-Round Keccak , 2011, INDOCRYPT.
[7] Anne Canteaut,et al. Higher-Order Differential Properties of Keccak and Luffa , 2011, FSE.
[8] Xuejia Lai,et al. Improved zero-sum distinguisher for full round Keccak-f permutation , 2011, IACR Cryptol. ePrint Arch..
[9] Thomas Peyrin,et al. Unaligned Rebound Attack: Application to Keccak , 2012, FSE.
[10] Marian Srebrny,et al. A SAT-based preimage analysis of reduced Keccak hash functions , 2013, Inf. Process. Lett..