Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512
暂无分享,去创建一个
[1] Eli Biham,et al. The Rectangle Attack - Rectangling the Serpent , 2001, EUROCRYPT.
[2] Shiho Moriai,et al. Efficient Algorithms for Computing Differential Properties of Addition , 2001, FSE.
[3] David A. Wagner,et al. The Boomerang Attack , 1999, FSE.
[4] Lars R. Knudsen,et al. Cryptanalysis of C2 , 2009, CRYPTO.
[5] Bruce Schneier,et al. Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent , 2000, FSE.
[6] Hui Chen,et al. Cryptanalysis of the Hash Functions MD4 and RIPEMD , 2005, EUROCRYPT.
[7] Xiaoyun Wang,et al. How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.
[8] Xiaoyun Wang,et al. Finding Collisions in the Full SHA-1 , 2005, CRYPTO.
[9] Eli Biham,et al. Related-Key Boomerang and Rectangle Attacks , 2005, EUROCRYPT.
[10] Eli Biham,et al. Differential Cryptanalysis of the Data Encryption Standard , 1993, Springer New York.
[11] Willi Meier,et al. Improved Cryptanalysis of Skein , 2009, IACR Cryptol. ePrint Arch..
[12] Stefan Lucks,et al. The Skein Hash Function Family , 2009 .
[13] Scott Contini,et al. Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions , 2006, ASIACRYPT.