Cryptanalysis of Hash Functions

被引:0
|
作者
Mendel, Florian [1 ]
机构
[1] Graz Univ Technol, A-8010 Graz, Austria
来源
关键词
ATTACKS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This extended abstract briefly summarizes a talk with the same title and gives literature pointers. In particular, we discuss recent advances in the cryptanalysis of ARX- and AES-based hash functions.
引用
收藏
页码:XVIII / XIX
页数:2
相关论文
共 50 条
  • [31] Cryptanalysis of the Yi-Lam hash
    Wagner, D
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 483 - 488
  • [32] Cryptanalysis of a hash function proposed at ICISC 2006
    Geiselmanni, Willi
    Steinwandt, Rainer
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2007, 2007, 4817 : 1 - +
  • [33] DIFFERENTIAL CRYPTANALYSIS OF FEAL AND N-HASH
    BIHAM, E
    SHAMIR, A
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 547 : 1 - 16
  • [34] Cryptanalysis of Tav-128 Hash Function
    Kumar, Ashish
    Sanadhya, Somitra Kumar
    Gauravaram, Praveen
    Safkhani, Masoumeh
    Naderi, Majid
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2010, 2010, 6498 : 118 - +
  • [35] Cryptanalysis of the Tillich–Zémor Hash Function
    Markus Grassl
    Ivana Ilić
    Spyros Magliveras
    Rainer Steinwandt
    Journal of Cryptology, 2011, 24 : 148 - 156
  • [36] CRYPTANALYSIS OF A HASH FUNCTION BASED ON ISOTOPY OF QUASIGROUPS
    Slaminkova, Ivana
    Vojvoda, Milan
    NILCRYPT 10, 2010, 45 : 137 - 149
  • [37] Quantum cryptanalysis of the full AES-256-based Davies–Meyer, Hirose and MJH hash functions
    Seungjun Baek
    Sehee Cho
    Jongsung Kim
    Quantum Information Processing, 21
  • [38] Hash functions
    Jenkins, B
    DR DOBBS JOURNAL, 1997, 22 (09): : 107 - +
  • [39] Cryptanalysis and Improvement of a Fast Hash Family for Memory Integrity
    Xu, Chengbo
    Yang, Shuying
    International Journal of Network Security, 2024, 26 (04) : 679 - 685
  • [40] Cryptanalysis of a key agreement protocol based on chaotic Hash
    He, Debiao
    Khan, Muhammad Khurram
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2013, 5 (3-4) : 172 - 177