Sciweavers

23 search results - page 1 / 5
» Meet-in-the-Middle Attacks on SHA-3 Candidates
Sort
View
ISW
2009
Springer
13 years 11 months ago
Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n
The recently started SHA-3 competition in order to find a new secure hash standard and thus a replacement for SHA-1/SHA-2 has attracted a lot of interest in the academic world as ...
Mario Lamberger, Florian Mendel
FSE
2009
Springer
159views Cryptology» more  FSE 2009»
14 years 1 days ago
Meet-in-the-Middle Attacks on SHA-3 Candidates
Dmitry Khovratovich, Ivica Nikolic, Ralf-Philipp W...
CHES
2010
Springer
175views Cryptology» more  CHES 2010»
13 years 6 months ago
Side-Channel Analysis of Six SHA-3 Candidates
Abstract. In this paper we study six 2nd round SHA-3 candidates from a side-channel cryptanalysis point of view. For each of them, we give the exact procedure and appropriate choic...
Olivier Benoît, Thomas Peyrin
FSE
2009
Springer
106views Cryptology» more  FSE 2009»
14 years 5 months ago
Practical Collisions for EnRUPT
The EnRUPT hash functions were proposed by O'Neil, Nohl and Henzen [5] as candidates for the SHA-3 competition, organised by NIST [4]. The proposal contains seven concrete has...
Sebastiaan Indesteege, Bart Preneel
CTRSA
2010
Springer
257views Cryptology» more  CTRSA 2010»
14 years 2 days ago
Practical Key Recovery Attack against Secret-IV Edon-
Abstract. The SHA-3 competition has been organized by NIST to select a new hashing standard. Edon-R was one of the fastest candidates in the first round of the competition. In thi...
Gaëtan Leurent