Cryptanalysis of Hash Functions

被引:0
|
作者
Mendel, Florian [1 ]
机构
[1] Graz Univ Technol, A-8010 Graz, Austria
来源
关键词
ATTACKS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This extended abstract briefly summarizes a talk with the same title and gives literature pointers. In particular, we discuss recent advances in the cryptanalysis of ARX- and AES-based hash functions.
引用
收藏
页码:XVIII / XIX
页数:2
相关论文
共 50 条
  • [41] Cryptanalysis of the Tillich-Z,mor Hash Function
    Grassl, Markus
    Ilic, Ivana
    Magliveras, Spyros
    Steinwandt, Rainer
    JOURNAL OF CRYPTOLOGY, 2011, 24 (01) : 148 - 156
  • [42] Cryptanalysis on PHOTON Hash Function using Cube Attack
    Lu, Chia-Yu
    Lin, You-Wei
    Jen, Shang-Ming
    Yang, Jar-Ferr
    THIRD INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND INTELLIGENT CONTROL (ISIC 2012), 2012, : 278 - 281
  • [43] Cryptanalysis of RC4-based hash function
    Orumiehchiha, Mohammad Ali
    Pieprzyk, Josef
    Steinfeld, Ron
    Conferences in Research and Practice in Information Technology Series, 2012, 125 : 33 - 38
  • [44] Cryptanalysis of a Hash Function Based on Norm Form Equations
    Aumasson, Jean-Philippe
    CRYPTOLOGIA, 2009, 33 (01) : 12 - 15
  • [45] Cryptanalysis of the Round-Reduced GOST Hash Function
    Zou, Jian
    Wu, Wenling
    Wu, Shuang
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2013, 2014, 8567 : 309 - 322
  • [46] Cryptanalysis of a hash function, and the modular subset sum problem
    Monico, Chris
    GROUPS COMPLEXITY CRYPTOLOGY, 2019, 11 (01) : 17 - 23
  • [47] Quantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions
    Baek, Seungjun
    Cho, Sehee
    Kim, Jongsung
    QUANTUM INFORMATION PROCESSING, 2022, 21 (05)
  • [48] Learning to hash: forgiving hash functions and applications
    Baluja, Shumeet
    Covell, Michele
    DATA MINING AND KNOWLEDGE DISCOVERY, 2008, 17 (03) : 402 - 430
  • [49] Learning to hash: forgiving hash functions and applications
    Shumeet Baluja
    Michele Covell
    Data Mining and Knowledge Discovery, 2008, 17 : 402 - 430
  • [50] Good hash tables & multiple hash functions
    Mitzenmacher, M
    DR DOBBS JOURNAL, 2002, 27 (05): : 28 - +