Practical pseudo-collisions for hash functions ARIRANG-224/384
In this paper we analyse the security of the SHA-3 candidate ARIRANG. We show that bitwise complementation of whole registers turns out to be very useful for constructing high-probability differential characteristics in the function. We use this approach to find near-collisions with Hamming weight 3...
Saved in:
Main Authors: | Guo, Jian, Matusiewicz, Krystian, Knudsen, Lars R., Ling, San, Wang, Huaxiong |
---|---|
Other Authors: | School of Physical and Mathematical Sciences |
Format: | Article |
Language: | English |
Published: |
2012
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/94159 http://hdl.handle.net/10220/7715 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Cryptanalysis of the LAKE hash family
by: Biryukov, Alex, et al.
Published: (2012) -
Analysis of cryptographic hash functions
by: Guo, Jian
Published: (2011) -
Formalizing human ignorance collision-resistant hashing without the keys
by: Phillip Rogaway
Published: (2018) -
Practical collision attacks against round-reduced SHA-3
by: Guo, Jian, et al.
Published: (2019) -
Generic attacks on hash combiners
by: Bao, Zhenzhen, et al.
Published: (2020)