Cryptanalysis of Hash Functions

被引:0
|
作者
Mendel, Florian [1 ]
机构
[1] Graz Univ Technol, A-8010 Graz, Austria
来源
关键词
ATTACKS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This extended abstract briefly summarizes a talk with the same title and gives literature pointers. In particular, we discuss recent advances in the cryptanalysis of ARX- and AES-based hash functions.
引用
收藏
页码:XVIII / XIX
页数:2
相关论文
共 50 条
  • [21] Cryptanalysis of hash functions based on blockciphers suitable for IoT service platform security
    Kim, Hangi
    Kim, Do-won
    Yi, Okyeon
    Kim, Jongsung
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (03) : 3107 - 3130
  • [22] Cryptanalysis of the GOST hash function
    Mendel, Florian
    Pramstaller, Norbert
    Rechberger, Christian
    Kontak, Marcin
    Szmidt, Janusz
    ADVANCES IN CRYPTOLOGY - CRYPTO 2008, PROCEEDINGS, 2008, 5157 : 162 - +
  • [23] Cryptanalysis of the LANE Hash Function
    Wu, Shuang
    Feng, Dengguo
    Wu, Wenling
    SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5867 : 126 - 140
  • [24] Cryptanalysis of hash functions based on blockciphers suitable for IoT service platform security
    Hangi Kim
    Do-won Kim
    Okyeon Yi
    Jongsung Kim
    Multimedia Tools and Applications, 2019, 78 : 3107 - 3130
  • [25] Non-random Properties of Compression and Hash Functions using Linear Cryptanalysis
    de Freitas, Daniel Santana
    Nakahara, Jorge, Jr.
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 471 - 477
  • [26] Cryptanalysis of T-function-based hash functions - Applications to MySQL password algorithms
    Muller, Frederic
    Peyrin, Thomas
    Information Security and Cryptology - ICISC 2006, Proceedings, 2006, 4296 : 267 - 285
  • [27] Cryptanalysis of the AEAD and hash algorithm DryGASCON
    Liang, Huicong
    Mesnager, Sihem
    Wang, Meiqin
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2022, 14 (03): : 597 - 625
  • [28] Cryptanalysis of GOST R hash function
    Wang, Zongyue
    Yu, Hongbo
    Wang, Xiaoyun
    INFORMATION PROCESSING LETTERS, 2014, 114 (12) : 655 - 662
  • [29] Cryptanalysis of the AEAD and hash algorithm DryGASCON
    Huicong Liang
    Sihem Mesnager
    Meiqin Wang
    Cryptography and Communications, 2022, 14 : 597 - 625
  • [30] Cryptanalysis of the alleged SecurID hash function
    Biryukov, A
    Lano, J
    Preneel, B
    SELECTED AREAS IN CRYPTOGRAPHY, 2004, 3006 : 130 - 144