New techniques for searching differential trails in Keccak
Keccak-f is the permutation used in the NIST SHA-3 hash function standard. Inspired by the previous exhaustive differential trail search methods by Mella et al. at ToSC 2017, we introduce in this paper new algorithms to cover 3-round trail cores with propagation weight at least 53, up from the previ...
Saved in:
Main Authors: | Liu, Guozhen, Qiu, Weidong, Tu, Yi |
---|---|
Other Authors: | School of Physical and Mathematical Sciences |
Format: | Article |
Language: | English |
Published: |
2020
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/145134 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Automatic preimage attack framework on Ascon using a linearize-and-guess approach
by: Li, Huina, et al.
Published: (2023) -
Get into the pool
by: Jeya, Sam
Published: (2020) -
Identifying malicious activities through anomaly detection in ethereum network
by: Neo, Remus Keng Long
Published: (2023) -
DAPA : Differential Analysis Aided Power Attack on (non-) linear feedback shift registers
by: Sim, Siang Meng, et al.
Published: (2021) -
Demonstration (web-based) of cryptographic hashing
by: Lim, Zi Yang
Published: (2018)