Practical collision attacks against round-reduced SHA-3
The Keccak hash function is the winner of the SHA-3 competition (2008–2012) and became the SHA-3 standard of NIST in 2015. In this paper, we focus on practical collision attacks against round-reduced SHA-3 and some Keccak variants. Following the framework developed by Dinur et al. at FSE 2012 where...
Saved in:
Main Authors: | Guo, Jian, Liao, Guohong, Liu, Guozhen, Liu, Meicheng, Qiao, Kexin, Song, Ling |
---|---|
Other Authors: | School of Physical and Mathematical Sciences |
Format: | Article |
Language: | English |
Published: |
2019
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/100424 http://hdl.handle.net/10220/49481 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Extended truncated-differential distinguishers on round-reduced AES
by: Bao, Zhenzhen, et al.
Published: (2020) -
Examples of weak AES implementation and attacks against them
by: Yeap, Ernest Zong Han
Published: (2022) -
Demonstration of attacks on SSL-TLS protocols
by: Iyer Rajagopal Mahadevan
Published: (2022) -
Cryptanalysis of the Tillich-Zémor hash function
by: Grassl, M., et al.
Published: (2014) -
Automatic search of Meet-in-the-Middle preimage attacks on AES-like hashing
by: Bao, Zhenzhen, et al.
Published: (2022)