Cryptanalysis of the Round-Reduced Kupyna Hash Function
暂无分享,去创建一个
[1] Vincent Rijmen,et al. Rebound Distinguishers: Results on the Full Whirlpool Compression Function , 2009, ASIACRYPT.
[2] Yu Sasaki,et al. (Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach , 2011, CT-RSA.
[3] Xiaoyun Wang,et al. Efficient Collision Search Attacks on SHA-0 , 2005, CRYPTO.
[4] Yu Sasaki,et al. Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1 , 2009, CRYPTO.
[5] David A. Wagner,et al. A Generalized Birthday Problem , 2002, CRYPTO.
[6] Vincent Rijmen,et al. Collision Attack on 5 Rounds of Grøstl , 2014, FSE.
[7] Kaisa Nyberg. Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers , 2008, FSE.
[8] Yu Sasaki,et al. Preimage Attacks on 3, 4, and 5-Pass HAVAL , 2008, ASIACRYPT.
[9] Florian Mendel,et al. The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl , 2009, FSE.
[10] Mitsuru Matsui,et al. Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings , 2009, ASIACRYPT.
[11] Shuang Wu,et al. Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks , 2012, ASIACRYPT.
[12] Huaxiong Wang,et al. Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 , 2010, ASIACRYPT.
[13] Roman Oliynykov,et al. A New Standard of Ukraine: The Kupyna Hash Function , 2015, IACR Cryptol. ePrint Arch..
[14] C. Moler,et al. Advances in Cryptology , 2000, Lecture Notes in Computer Science.
[15] Florian Mendel,et al. A (Second) Preimage Attack on the GOST Hash Function , 2008, FSE.
[16] Gaëtan Leurent,et al. MD4 is Not One-Way , 2008, FSE.
[17] Florian Mendel,et al. Symmetric Cryptography , 2009 .
[18] Shuang Wu,et al. Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grostl Hash Function , 2014, J. Inf. Sci. Eng..
[19] Yu Sasaki,et al. Finding Preimages in Full MD5 Faster Than Exhaustive Search , 2009, EUROCRYPT.
[20] Florian Mendel,et al. Cryptanalysis of the GOST Hash Function , 2008, CRYPTO.
[21] Thomas Peyrin,et al. Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher , 2009, Selected Areas in Cryptography.
[22] Jian Guo,et al. Preimages for Step-Reduced SHA-2 , 2009, IACR Cryptol. ePrint Arch..
[23] Yu Sasaki,et al. Preimage Attacks on One-Block MD4, 63-Step MD5 and More , 2009, Selected Areas in Cryptography.
[24] Xiaoyun Wang,et al. Finding Collisions in the Full SHA-1 , 2005, CRYPTO.
[25] Shuang Wu,et al. (Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others , 2012, FSE.
[26] Thomas Peyrin,et al. Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations , 2010, FSE.
[27] Yu Sasaki,et al. Rebound Attack on the Full Lane Compression Function , 2009, ASIACRYPT.
[28] Xiaoyun Wang,et al. How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.