Sciweavers

53 search results - page 1 / 11
» Cryptanalysis of the GOST Hash Function
Sort
View
CRYPTO
2008
Springer
163views Cryptology» more  CRYPTO 2008»
13 years 7 months ago
Cryptanalysis of the GOST Hash Function
In this article, we analyze the security of the GOST hash function. The GOST hash function, defined in the Russian standard GOST 34.11-94, is an iterated hash function producing a ...
Florian Mendel, Norbert Pramstaller, Christian Rec...
IACR
2011
135views more  IACR 2011»
12 years 5 months ago
Algebraic Complexity Reduction and Cryptanalysis of GOST
Abstract. GOST 28147-89 is a well-known block cipher and the official encryption standard of the Russian Federation. Its large key size of 256 bits at a particularly low implementa...
Nicolas Courtois
INFORMATICASI
2002
128views more  INFORMATICASI 2002»
13 years 5 months ago
Cryptanalysis of Some Hash Functions Based on Block Ciphers and Codes
At PKC 2000, Inoue and Sakurai proposed some methods to design hash functions from block ciphers and codes (block codes and convolutional codes). They claimed that their hash func...
Hongjun Wu, Feng Bao, Robert H. Deng
JOC
1998
135views more  JOC 1998»
13 years 5 months ago
Attacks on Fast Double Block Length Hash Functions
The security of hash functions based on a block cipher with a block length of m bits and a key length of k bits, where k ≤ m, is considered. New attacks are presented on a large ...
Lars R. Knudsen, Xuejia Lai, Bart Preneel
ACNS
2008
Springer
107views Cryptology» more  ACNS 2008»
13 years 12 months ago
Attacking Reduced Round SHA-256
The SHA-256 hash function has started getting attention recently by the cryptanalysis community
Somitra Kumar Sanadhya, Palash Sarkar