Improved security analysis of Fugue-256
暂无分享,去创建一个
[1] Jean-Philippe Aumasson,et al. Distinguisher for Full Final Round of Fugue-256 , 2010 .
[2] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[3] Raphael C.-W. Phan,et al. On the cryptanalysis of the hash function Fugue: Partitioning and inside-out distinguishers , 2011, Inf. Process. Lett..
[4] John Kelsey,et al. Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competition , 2011 .
[5] Dmitry Khovratovich,et al. Cryptanalysis of Hash Functions with Structures , 2009, Selected Areas in Cryptography.
[6] Pamela G. Guren,et al. Candidates , 1982 .
[7] Lars R. Knudsen,et al. The Grindahl Hash Functions , 2007, FSE.
[8] David A. Wagner,et al. Integral Cryptanalysis , 2002, FSE.
[9] Meltem Sönmez Turan,et al. Near-Collisions for the Reduced Round Versions of Some Second Round SHA-3 Compression Functions Using Hill Climbing , 2010, INDOCRYPT.