The Grøstl hash function is one of the five finalists in the third round of SHA-3 competition hosted by NIST. In this paper, we propose some improved (pseudo) preimage attacks on the Grøstl hash function by using some techniques, such as sub-space preimage attack and the guess-and-determine technique. We present the improved pseudo preimage attacks on 5-round Grøstl-256 hash function and 8-round Grøstl-512 hash function, and the complexities of these attacks are (2239.90, 2240.40) (in time and memory) and (2499.50, 2499), respectively. We also extend the pseudo preimage from 5 rounds to 6 rounds for Grøstl-256 hash function, besides the biclique attack. Further-more, we propose the pseudo second preimage attack on 6-round Grøstl-256 hash fu...
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of th...
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of th...
We analyze the Grøstl hash function, which is a 2nd-round candidate of the SHA-3 competition. Using ...
Grøstl is one of the five finalists in the third round of SHA-3 competition hosted by NIST. In this ...
The Grøstl hash function is one of the 5 final round candidates of the SHA-3 competition hosted by N...
Abstract. In this paper, we present improved preimage attacks on the reduced-round GOST hash functio...
In this paper, we present improved preimage attacks on the reduced-round \texttt{GOST} hash function...
International audienceAt CRYPTO 2012, Knellwolf and Khovratovich presented a differential formulatio...
Abstract. In August 2012, the Stribog hash function was selected as the new Russian cryptographic ha...
International audienceAt CRYPTO 2012, Knellwolf and Khovratovich presented a differential formulatio...
We revisit narrow-pipe designs that are in practical use, and their security against preimage attack...
International audienceAt CRYPTO 2012, Knellwolf and Khovratovich presented a differential formulatio...
We revisit narrow-pipe designs that are in practical use, and their security against preimage attack...
Abstract. We revisit narrow-pipe designs that are in practical use, and their security against preim...
International audienceAt CRYPTO 2012, Knellwolf and Khovratovich presented a differential formulatio...
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of th...
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of th...
We analyze the Grøstl hash function, which is a 2nd-round candidate of the SHA-3 competition. Using ...
Grøstl is one of the five finalists in the third round of SHA-3 competition hosted by NIST. In this ...
The Grøstl hash function is one of the 5 final round candidates of the SHA-3 competition hosted by N...
Abstract. In this paper, we present improved preimage attacks on the reduced-round GOST hash functio...
In this paper, we present improved preimage attacks on the reduced-round \texttt{GOST} hash function...
International audienceAt CRYPTO 2012, Knellwolf and Khovratovich presented a differential formulatio...
Abstract. In August 2012, the Stribog hash function was selected as the new Russian cryptographic ha...
International audienceAt CRYPTO 2012, Knellwolf and Khovratovich presented a differential formulatio...
We revisit narrow-pipe designs that are in practical use, and their security against preimage attack...
International audienceAt CRYPTO 2012, Knellwolf and Khovratovich presented a differential formulatio...
We revisit narrow-pipe designs that are in practical use, and their security against preimage attack...
Abstract. We revisit narrow-pipe designs that are in practical use, and their security against preim...
International audienceAt CRYPTO 2012, Knellwolf and Khovratovich presented a differential formulatio...
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of th...
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of th...
We analyze the Grøstl hash function, which is a 2nd-round candidate of the SHA-3 competition. Using ...