Sciweavers

IACR
2011
106views more  IACR 2011»
12 years 4 months ago
Unaligned Rebound Attack - Application to Keccak
We analyze the internal permutations of Keccak, one of the NIST SHA-3 competition finalists, in regard to differential properties. By carefully studying the elements composing th...
Alexandre Duc, Jian Guo 0001, Thomas Peyrin, Lei W...
ACISP
2011
Springer
12 years 8 months ago
Cryptanalysis of the Compression Function of SIMD
Abstract. SIMD is one of the second round candidates of the SHA3 competition hosted by NIST. In this paper, we present some results
Hongbo Yu, Xiaoyun Wang