An Improved Algebraic Attack on Hamsi-256
暂无分享,去创建一个
[1] Thomas Peyrin,et al. Distinguishers for the Compression Function and Output Transformation of Hamsi-256 , 2010, ACISP.
[2] Meltem Sönmez Turan,et al. Message Recovery and Pseudo-preimage Attacks on the Compression Function of Hamsi-256 , 2010, LATINCRYPT.
[3] Kasteelpark Arenberg,et al. The Hash Function Hamsi , 2008 .
[4] Thomas Fuhr. Finding Second Preimages of Short Messages for Hamsi-256 , 2010, ASIACRYPT.
[5] Wei Wang,et al. New Pseudo-Near-Collision Attack on Reduced-Round of Hamsi-256 , 2009, IACR Cryptol. ePrint Arch..
[6] Anne Canteaut,et al. Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256 , 2010, Selected Areas in Cryptography.
[7] Bruce Schneier,et al. Second Preimages on n-bit Hash Functions for Much Less than 2n Work , 2005, IACR Cryptol. ePrint Arch..
[8] Antoine Joux,et al. Algorithmic Cryptanalysis , 2009 .
[9] Adi Shamir,et al. Fast Exhaustive Search for Polynomial Systems in F2 , 2010, IACR Cryptol. ePrint Arch..
[10] Gaëtan Leurent,et al. MD4 is Not One-Way , 2008, FSE.