-
1
-
-
72449208565
-
Preimages for Step-Reduced SHA-2
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Aoki, K., Guo, J., Matusiewicz, K., Sasaki, Y., Wang, L.: Preimages for Step-Reduced SHA-2. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 578-597. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 578-597
-
-
Aoki, K.1
Guo, J.2
Matusiewicz, K.3
Sasaki, Y.4
Wang, L.5
-
2
-
-
70350302881
-
Meet-in-the-middle preimage attacks against reduced SHA-0 and SHA-1
-
Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
-
Aoki, K., Sasaki, Y.: Meet-in-the-middle preimage attacks against reduced SHA-0 and SHA-1. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 70-89. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 70-89
-
-
Aoki, K.1
Sasaki, Y.2
-
3
-
-
70350630742
-
Preimage attacks on one-block MD4, 63-step MD5 and more
-
Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. Springer, Heidelberg
-
Aoki, K., Sasaki, Y.: Preimage attacks on one-block MD4, 63-step MD5 and more. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol. 5381, pp. 103-119. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5381
, pp. 103-119
-
-
Aoki, K.1
Sasaki, Y.2
-
4
-
-
70350634268
-
Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
-
Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. Springer, Heidelberg
-
Aumasson, J.-P., Meier, W., Mendel, F.: Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol. 5381, pp. 120-135. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5381
, pp. 120-135
-
-
Aumasson, J.-P.1
Meier, W.2
Mendel, F.3
-
5
-
-
77954648187
-
Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds
-
Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
-
Biryukov, A., Dunkelman, O., Keller, N., Khovratovich, D., Shamir, A.: Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 299-319. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 299-319
-
-
Biryukov, A.1
Dunkelman, O.2
Keller, N.3
Khovratovich, D.4
Shamir, A.5
-
6
-
-
72449149100
-
Related-key cryptanalysis of the full AES-192 and AES-256
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Biryukov, A., Khovratovich, D.: Related-key cryptanalysis of the full AES-192 and AES-256. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 1-18. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 1-18
-
-
Biryukov, A.1
Khovratovich, D.2
-
7
-
-
70350346078
-
Distinguisher and related-key attack on the full AES-256
-
Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
-
Biryukov, A., Khovratovich, D., Nikolić, I.: Distinguisher and related-key attack on the full AES-256. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 231-249. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 231-249
-
-
Biryukov, A.1
Khovratovich, D.2
Nikolić, I.3
-
9
-
-
77954646661
-
Automatic search for related-key differential characteristics in byte-oriented block ciphers: Application to AES, camellia, khazad and others
-
Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
-
Biryukov, A., Nikolić, I.: Automatic search for related-key differential characteristics in byte-oriented block ciphers: Application to AES, camellia, khazad and others. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 322-344. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 322-344
-
-
Biryukov, A.1
Nikolić, I.2
-
10
-
-
51049092732
-
Hash functions and RFID tags: Mind the gap
-
Oswald, E., Rohatgi, P. (eds.) CHES 2008. Springer, Heidelberg
-
Bogdanov, A., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y.: Hash functions and RFID tags: Mind the gap. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 283-299. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5154
, pp. 283-299
-
-
Bogdanov, A.1
Leander, G.2
Paar, C.3
Poschmann, A.4
Robshaw, M.J.B.5
Seurin, Y.6
-
11
-
-
51849105110
-
Preimages for reduced SHA-0 and SHA-1
-
Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
-
De Cannière, C., Rechberger, C.: Preimages for reduced SHA-0 and SHA-1. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 179-202. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 179-202
-
-
De Cannière, C.1
Rechberger, C.2
-
13
-
-
50249150254
-
A meet-in-the-middle attack on 8-round AES
-
Nyberg, K. (ed.) FSE 2008. Springer, Heidelberg
-
Demirci, H., Selçuk, A.A.: A meet-in-the-middle attack on 8-round AES. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 116-126. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5086
, pp. 116-126
-
-
Demirci, H.1
Selçuk, A.A.2
-
14
-
-
79959983406
-
The effects of the omission of last round's MixColumns on AES
-
ePrint Archive, Report 2010/041
-
Dunkelman, O., Keller, N.: The effects of the omission of last round's MixColumns on AES. Cryptology ePrint Archive, Report 2010/041 (2010), http://eprint.iacr.org/2010/041
-
(2010)
Cryptology
-
-
Dunkelman, O.1
Keller, N.2
-
15
-
-
78650817425
-
Improved single-key attacks on 8-round AES-192 and AES-256
-
Abe, M. (ed.) ASIACRYPT 2010. Springer, Heidelberg
-
Dunkelman, O., Keller, N., Shamir, A.: Improved single-key attacks on 8-round AES-192 and AES-256. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 158-176. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6477
, pp. 158-176
-
-
Dunkelman, O.1
Keller, N.2
Shamir, A.3
-
16
-
-
12444346059
-
A collision attack on 7 rounds Rijndael
-
Springer, Heidelberg
-
Gilbert, H., Minier, M.: A collision attack on 7 rounds Rijndael. In: Third AES Candidate Conference (AES3), pp. 230-241. Springer, Heidelberg (2000)
-
(2000)
Third AES Candidate Conference (AES3)
, pp. 230-241
-
-
Gilbert, H.1
Minier, M.2
-
17
-
-
77954698821
-
Super-sbox cryptanalysis: Improved attacks for AES-like permutations
-
Hong, S., Iwata, T. (eds.) FSE 2010. Springer, Heidelberg
-
Gilbert, H., Peyrin, T.: Super-sbox cryptanalysis: Improved attacks for AES-like permutations. In: Hong, S., Iwata, T. (eds.) FSE 2010. LNCS, vol. 6147, pp. 365-383. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6147
, pp. 365-383
-
-
Gilbert, H.1
Peyrin, T.2
-
18
-
-
78650822495
-
Advanced meet-in-the-middle preimage attacks: First results on full tiger, and improved results on MD4 and SHA-2
-
Abe, M. (ed.) ASIACRYPT 2010. Springer, Heidelberg
-
Guo, J., Ling, S., Rechberger, C., Wang, H.: Advanced meet-in-the-middle preimage attacks: First results on full tiger, and improved results on MD4 and SHA-2. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 56-75. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6477
, pp. 56-75
-
-
Guo, J.1
Ling, S.2
Rechberger, C.3
Wang, H.4
-
19
-
-
70349881815
-
Preimages for reduced-round tiger
-
Lucks, S., Sadeghi, A.-R., Wolf, C. (eds.) WEWoRC 2007. Springer, Heidelberg
-
Indesteege, S., Preneel, B.: Preimages for reduced-round tiger. In: Lucks, S., Sadeghi, A.-R., Wolf, C. (eds.) WEWoRC 2007. LNCS, vol. 4945, pp. 90-99. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4945
, pp. 90-99
-
-
Indesteege, S.1
Preneel, B.2
-
20
-
-
24944541563
-
n work
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
n work. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 474-490. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 474-490
-
-
Kelsey, J.1
Schneier, B.2
-
21
-
-
38149128144
-
Known-key distinguishers for some block ciphers
-
Kurosawa, K. (ed.) ASIACRYPT 2007. Springer, Heidelberg
-
Knudsen, L.R., Rijmen, V.: Known-key distinguishers for some block ciphers. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 315-324. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 315-324
-
-
Knudsen, L.R.1
Rijmen, V.2
-
22
-
-
70549109284
-
Rebound distinguishers: Results on the full whirlpool compression function
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Lamberger, M., Mendel, F., Rechberger, C., Rijmen, V., Schläffer,M.: Rebound distinguishers: Results on the full whirlpool compression function. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 126-143. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 126-143
-
-
Lamberger, M.1
Mendel, F.2
Rechberger, C.3
Rijmen, V.4
Schläffer, M.5
-
23
-
-
78649983628
-
The rebound attack and subspace distinguishers: Application to Whirlpool
-
ePrint Archive, Report 2010/198
-
Lamberger, M., Mendel, F., Rechberger, C., Rijmen, V., Schläffer, M.: The rebound attack and subspace distinguishers: Application to Whirlpool. Cryptology ePrint Archive, Report 2010/198 (2010), http://eprint.iacr.org/2010/ 198
-
(2010)
Cryptology
-
-
Lamberger, M.1
Mendel, F.2
Rechberger, C.3
Rijmen, V.4
Schläffer, M.5
-
24
-
-
50249175901
-
MD4 is not one-way
-
Nyberg, K. (ed.) FSE 2008. Springer, Heidelberg
-
Leurent, G.: MD4 is not one-way. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 412-428. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5086
, pp. 412-428
-
-
Leurent, G.1
-
25
-
-
58549091917
-
New impossible differential attacks on AES
-
Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. Springer, Heidelberg
-
Lu, J., Dunkelman, O., Keller, N., Kim, J.-S.: New impossible differential attacks on AES. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 279-293. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5365
, pp. 279-293
-
-
Lu, J.1
Dunkelman, O.2
Keller, N.3
Kim, J.-S.4
-
26
-
-
70549111559
-
Improved cryptanalysis of the reduced grøstl compression function, ECHO permutation and AES block cipher
-
Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. Springer, Heidelberg
-
Mendel, F., Peyrin, T., Rechberger, C., Schläffer, M.: Improved cryptanalysis of the reduced grøstl compression function, ECHO permutation and AES block cipher. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol. 5867, pp. 16-35. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5867
, pp. 16-35
-
-
Mendel, F.1
Peyrin, T.2
Rechberger, C.3
Schläffer, M.4
-
27
-
-
70350398631
-
The rebound attack: Cryptanalysis of reduced whirlpool and grøstl
-
Dunkelman, O. (ed.) FSE 2009. Springer, Heidelberg
-
Mendel, F., Rechberger, C., Schläffer, M., Thomsen, S.S.: The rebound attack: Cryptanalysis of reduced whirlpool and grøstl. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol. 5665, pp. 260-276. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5665
, pp. 260-276
-
-
Mendel, F.1
Rechberger, C.2
Schläffer, M.3
Thomsen, S.S.4
-
28
-
-
84944878354
-
-
CRC Press, Boca Raton
-
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
29
-
-
85026897539
-
Hash functions based on block ciphers: A synthetic approach
-
Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
-
Preneel, B., Govaerts, R., Vandewalle, J.: Hash functions based on block ciphers: A synthetic approach. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 368-378. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 368-378
-
-
Preneel, B.1
Govaerts, R.2
Vandewalle, J.3
-
31
-
-
58349091571
-
Preimage attacks on 3, 4, and 5-pass HAVAL
-
Pieprzyk, J. (ed.) ASIACRYPT 2008. Springer, Heidelberg
-
Sasaki, Y., Aoki, K.: Preimage attacks on 3, 4, and 5-pass HAVAL. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 253-271. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5350
, pp. 253-271
-
-
Sasaki, Y.1
Aoki, K.2
-
32
-
-
67650679771
-
Finding preimages in full MD5 faster than exhaustive search
-
Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
-
Sasaki, Y., Aoki, K.: Finding preimages in full MD5 faster than exhaustive search. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 134-152. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 134-152
-
-
Sasaki, Y.1
Aoki, K.2
-
33
-
-
70350754096
-
Blockcipher-based hashing revisited
-
Dunkelman, O. (ed.) FSE 2009. Springer, Heidelberg
-
Stam, M.: Blockcipher-based hashing revisited. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol. 5665, pp. 67-83. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5665
, pp. 67-83
-
-
Stam, M.1
-
34
-
-
84965066515
-
Specification for the Advanced Encryption Standard (AES)
-
U.S. Department of Commerce
-
U.S. Department of Commerce, National Institute of Standards and Technology. Specification for the ADVANCED ENCRYPTION STANDARD (AES) (Federal Information Processing Standards Publication 197) (2001), http://csrc.nist.gov/ encryption/aes/index.html#fips
-
(2001)
Federal Information Processing Standards Publication
, vol.197
-
-
-
35
-
-
79959960972
-
-
U.S. Department of Commerce, Friday, November 2, 2007/Notices
-
U.S. Department of Commerce, National Institute of Standards and Technology. Federal Register /Vol. 72, No. 212/Friday, November 2, 2007/Notices (2007), http://csrc.nist.gov/groups/ST/hash/documents/FR-Notice-Nov07.pdf
-
(2007)
Federal Register
, vol.72
, Issue.212
-
-
-
36
-
-
79959956832
-
Meet-in-the-middle attack on 8 rounds of AES block cipher under 192 key bits
-
ePrint Archive, Report 2010/537 (appeared in the accepted papers list of ISPEC 2011)
-
Wei, Y., Lu, J., Hu, Y.: Meet-in-the-middle attack on 8 rounds of AES block cipher under 192 key bits. Cryptology ePrint Archive, Report 2010/537 (2010), http://eprint.iacr.org/2010/537 (appeared in the accepted papers list of ISPEC 2011)
-
(2010)
Cryptology
-
-
Wei, Y.1
Lu, J.2
Hu, Y.3
|