메뉴 건너뛰기




Volumn 5912 LNCS, Issue , 2009, Pages 126-143

Rebound distinguishers: Results on the full Whirlpool compression function

Author keywords

Cryptanalysis; Distinguisher; Hash functions; Near collision

Indexed keywords

BLOCK CIPHERS; COLLISION ATTACK; COMPRESSION FUNCTIONS; CRYPTANALYSIS; DEGREES OF FREEDOM; DISTINGUISHERS; DISTINGUISHING ATTACKS; MEMORY REQUIREMENTS;

EID: 70549109284     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-10366-7_8     Document Type: Conference Paper
Times cited : (104)

References (26)
  • 1
    • 72449132148 scopus 로고    scopus 로고
    • Barreto, P.S.L.M., Rijmen, V.: The Whirlpool Hashing Function. Submitted to NESSIE (September 2000), http://www.larc.usp.br/~pbarreto/WhirlpoolPage.html (2008/12/11) (revised May 2003)
    • Barreto, P.S.L.M., Rijmen, V.: The Whirlpool Hashing Function. Submitted to NESSIE (September 2000), http://www.larc.usp.br/~pbarreto/WhirlpoolPage.html (2008/12/11) (revised May 2003)
  • 2
    • 84903595110 scopus 로고
    • Differential Cryptanalysis of DES-like Cryptosystems
    • Menezes, A, Vanstone, S.A, eds, CRYPTO 1990, Springer, Heidelberg
    • Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 2-21. Springer, Heidelberg (1991)
    • (1991) LNCS , vol.537 , pp. 2-21
    • Biham, E.1    Shamir, A.2
  • 3
    • 50449107349 scopus 로고    scopus 로고
    • Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV
    • Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
    • Black, J., Rogaway, P., Shrimpton, T.: Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 320-335. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 320-335
    • Black, J.1    Rogaway, P.2    Shrimpton, T.3
  • 4
    • 84946823597 scopus 로고    scopus 로고
    • The Wide Trail Design Strategy
    • Honary, B, ed, Cryptography and Coding 2001, Springer, Heidelberg
    • Daemen, J., Rijmen, V.: The Wide Trail Design Strategy. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol. 2260, pp. 222-238. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2260 , pp. 222-238
    • Daemen, J.1    Rijmen, V.2
  • 5
    • 0038218554 scopus 로고    scopus 로고
    • Information Security and Cryptography. Springer, Heidelberg , ISBN 3-540-42580-2
    • Daemen, J., Rijmen, V.: The Design of Rijndael. Information Security and Cryptography. Springer, Heidelberg (2002), ISBN 3-540-42580-2
    • (2002) The Design of Rijndael
    • Daemen, J.1    Rijmen, V.2
  • 6
    • 38549144112 scopus 로고    scopus 로고
    • De Cannière, C., Mendel, F., Rechberger, C.: Collisions for 70-Step SHA-1: On the Full Cost of Collision Search. In: Adams, C.M., Miri, A., Wiener, M.J. (eds.) SAC 2007. LNCS, 4876, pp. 56-73. Springer, Heidelberg (2007)
    • De Cannière, C., Mendel, F., Rechberger, C.: Collisions for 70-Step SHA-1: On the Full Cost of Collision Search. In: Adams, C.M., Miri, A., Wiener, M.J. (eds.) SAC 2007. LNCS, vol. 4876, pp. 56-73. Springer, Heidelberg (2007)
  • 7
    • 38049183978 scopus 로고    scopus 로고
    • Finding SHA-1 Characteristics: General Results and Applications
    • Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
    • De Cannière, C., Rechberger, C.: Finding SHA-1 Characteristics: General Results and Applications. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 1-20. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4284 , pp. 1-20
    • De Cannière, C.1    Rechberger, C.2
  • 8
    • 72449182451 scopus 로고    scopus 로고
    • Filho, D.G., Barreto, P.S., Rijmen, V.: The Maelstrom-0 hash function. In: SBSeg 2006 (2006)
    • Filho, D.G., Barreto, P.S., Rijmen, V.: The Maelstrom-0 hash function. In: SBSeg 2006 (2006)
  • 9
    • 0042156782 scopus 로고
    • Classroom Notes: Matrices over a Finite Field
    • Fisher, S.D.: Classroom Notes: Matrices over a Finite Field. Amer. Math. Monthly 73(6), 639-641 (1966)
    • (1966) Amer. Math. Monthly , vol.73 , Issue.6 , pp. 639-641
    • Fisher, S.D.1
  • 10
    • 84948949623 scopus 로고    scopus 로고
    • Knudsen, L.R.: Truncated and Higher Order Differentials. In: Preneel, B. (ed.) FSE 1994. LNCS, 1008, pp. 196-211. Springer, Heidelberg (1995)
    • Knudsen, L.R.: Truncated and Higher Order Differentials. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 196-211. Springer, Heidelberg (1995)
  • 11
    • 70350384894 scopus 로고    scopus 로고
    • Non-random properties of reduced-round Whirlpool
    • NESSIE public report, NES/DOC/UIB/WP5/017/1
    • Knudsen, L.R.: Non-random properties of reduced-round Whirlpool. NESSIE public report, NES/DOC/UIB/WP5/017/1 (2002)
    • (2002)
    • Knudsen, L.R.1
  • 12
    • 38149128144 scopus 로고    scopus 로고
    • Known-key distinguishers for some block ciphers
    • Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
    • Knudsen, L.R., Rijmen, V.: Known-key distinguishers for some block ciphers. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 315-324. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 315-324
    • Knudsen, L.R.1    Rijmen, V.2
  • 14
    • 70549103557 scopus 로고    scopus 로고
    • Rebound Attack on the Full LANE Compression Function
    • Matsui, M, ed, ASIACRYPT 2009, Springer, Heidelberg
    • Matusiewicz, K., Naya-Plasencia, M., Nikolić, I., Sasaki, Y., Schläffer, M.: Rebound Attack on the Full LANE Compression Function. In:Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 106-125. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5912 , pp. 106-125
    • Matusiewicz, K.1    Naya-Plasencia, M.2    Nikolić, I.3    Sasaki, Y.4    Schläffer, M.5
  • 15
    • 70549111559 scopus 로고    scopus 로고
    • Mendel, F., Peyrin, T., Rechberger, C., Schläffer, M.: Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, 5867, pp. 16-35. Springer, Heidelberg (2009)
    • Mendel, F., Peyrin, T., Rechberger, C., Schläffer, M.: Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol. 5867, pp. 16-35. Springer, Heidelberg (2009)
  • 16
    • 70350398631 scopus 로고    scopus 로고
    • Mendel, F., Rechberger, C., Schläffer, M., Thomsen, S.S.: The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl. In: Dunkelman, O. (ed.) FSE 2009. LNCS, 5665, pp. 260-276. Springer, Heidelberg (2009)
    • Mendel, F., Rechberger, C., Schläffer, M., Thomsen, S.S.: The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol. 5665, pp. 260-276. Springer, Heidelberg (2009)
  • 17
    • 38149133737 scopus 로고    scopus 로고
    • Cryptanalysis of the Tiger Hash Function
    • Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
    • Mendel, F., Rijmen, V.: Cryptanalysis of the Tiger Hash Function. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 536-550. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 536-550
    • Mendel, F.1    Rijmen, V.2
  • 19
    • 72449142978 scopus 로고    scopus 로고
    • National Institute of Standards and Technology: FIPS PUB 197, Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197, U.S. Department of Commerce (November 2001)
    • National Institute of Standards and Technology: FIPS PUB 197, Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197, U.S. Department of Commerce (November 2001)
  • 21
    • 38149068987 scopus 로고    scopus 로고
    • Cryptanalysis of Grindahl
    • Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
    • Peyrin, T.: Cryptanalysis of Grindahl. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 551-567. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 551-567
    • Peyrin, T.1
  • 22
    • 0002470563 scopus 로고
    • A remark on Stirling's formula
    • Robbins, H.: A remark on Stirling's formula. Amer. Math. Monthly 62, 26-29 (1955)
    • (1955) Amer. Math. Monthly , vol.62 , pp. 26-29
    • Robbins, H.1
  • 23
    • 84890522850 scopus 로고
    • Communication Theory of Secrecy Systems
    • Shannon, C.E.: Communication Theory of Secrecy Systems. Bell Systems Technical Journal 28, 656-715 (1949)
    • (1949) Bell Systems Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 24
    • 24944575304 scopus 로고    scopus 로고
    • Cryptanalysis of the Hash Functions MD4 and RIPEMD
    • Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Wang, X., Lai, X., Feng, D., Chen, H., Yu, X.: Cryptanalysis of the Hash Functions MD4 and RIPEMD. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 1-18. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 1-18
    • Wang, X.1    Lai, X.2    Feng, D.3    Chen, H.4    Yu, X.5
  • 25
    • 33745171465 scopus 로고    scopus 로고
    • Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, 3621, pp. 17-36. Springer, Heidelberg (2005)
    • Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17-36. Springer, Heidelberg (2005)
  • 26
    • 24944591357 scopus 로고    scopus 로고
    • How to Break MD5 and Other Hash Functions
    • Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Wang, X., Yu, H.: How to Break MD5 and Other Hash Functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19-35. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 19-35
    • Wang, X.1    Yu, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.