Cryptanalysis of Hash Functions

被引:0
|
作者
Mendel, Florian [1 ]
机构
[1] Graz Univ Technol, A-8010 Graz, Austria
来源
关键词
ATTACKS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This extended abstract briefly summarizes a talk with the same title and gives literature pointers. In particular, we discuss recent advances in the cryptanalysis of ARX- and AES-based hash functions.
引用
收藏
页码:XVIII / XIX
页数:2
相关论文
共 50 条
  • [1] Cryptanalysis of Hash Functions with Structures
    Khovratovich, Dmitry
    SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5867 : 108 - 125
  • [2] Cryptanalysis of the LSH hash functions
    Hao, Yonglin
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3296 - 3308
  • [3] Cryptanalysis of the HaF Family of Hash Functions
    Buczek, Mateusz
    Kontak, Marcin
    2013 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MCC), 2013,
  • [4] Cryptanalysis of the ESSENCE Family of Hash Functions
    Mouha, Nicky
    Sekar, Gautham
    Aumasson, Jean-Philippe
    Peyrin, Thomas
    Thomsen, Soren S.
    Turan, Meltem Soenmez
    Preneel, Bart
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 15 - +
  • [5] CRYPTANALYSIS OF THE HAF FAMILY OF HASH FUNCTIONS
    Buczek, Mateusz
    Kontak, Marcin
    STUDIA SCIENTIARUM MATHEMATICARUM HUNGARICA, 2015, 52 (02) : 277 - 287
  • [6] Applications of SAT solvers to cryptanalysis of hash functions
    Mironov, Ilya
    Zhang, Lintao
    THEORY AND APPLICATIONS OF SATISFIABILITY TESTING - SAT 2006, PROCEEDINGS, 2006, 4121 : 102 - 115
  • [7] Full Cryptanalysis of LPS and Morgenstern Hash Functions
    Petit, Christophe
    Lauter, Kristin
    Quisquater, Jean-Jacques
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2008, 5229 : 263 - +
  • [8] Cryptanalysis of Hash Functions Using Advanced Multiprocessing
    Gomez, J.
    Montoya, F. G.
    Benedicto, R.
    Jimenez, A.
    Gil, C.
    Alcayde, A.
    DISTRIBUTED COMPUTING AND ARTIFICIAL INTELLIGENCE, 2010, 79 : 221 - 228
  • [9] Quantum cryptanalysis of hash and claw-free functions
    Brassard, G
    Hoyer, P
    Tapp, A
    LATIN '98: THEORETICAL INFORMATICS, 1998, 1380 : 163 - 169
  • [10] Cryptanalysis of the hash functions MD4 and RIPEMD
    Wang, XY
    Lai, XJ
    Feng, DG
    Chen, H
    Yu, XY
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 1 - 18