Preimage attacks on the round-reduced Keccak with the aid of differential cryptanalysis
暂无分享,去创建一个
[1] Adi Shamir,et al. Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials , 2013, FSE.
[2] Guido Bertoni,et al. Keccak sponge function family main document , 2009 .
[3] María Naya-Plasencia,et al. Practical Analysis of Reduced-Round Keccak , 2011, INDOCRYPT.
[4] Adi Shamir,et al. New Attacks on Keccak-224 and Keccak-256 , 2012, FSE.
[5] Xuejia Lai,et al. Improved zero-sum distinguisher for full round Keccak-f permutation , 2011, IACR Cryptol. ePrint Arch..
[6] Marian Srebrny,et al. Security margin evaluation of SHA-3 contest finalists through SAT-based attacks , 2012, IACR Cryptol. ePrint Arch..
[7] Marian Srebrny,et al. Rotational Cryptanalysis of Round-Reduced Keccak , 2013, FSE.
[8] Anne Canteaut,et al. Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256 , 2010, Selected Areas in Cryptography.
[9] Thomas Peyrin,et al. Unaligned Rebound Attack: Application to Keccak , 2012, FSE.