Abstract. In this paper we study the strength of two hash functions which are based on Generalized Feistels. We describe a new kind of attack based on a cancellation property in the round function. This new technique allows to efficiently use the degrees of freedom available to attack a hash function. Using the cancellation property, we can avoid the non-linear parts of the round function, at the expense of some freedom degrees. Our attacks are mostly independent of the round function in use, and can be applied to similar hash functions which share the same structure but have different round functions. We start with a 22-round generic attack on the structure of Lesamnta, and adapt it to the actual round function to attack 24-round Lesamnta ...
The Feistel structure is well-known as a good structure for building block ciphers, due to its prope...
The Grøstl hash function is one of the 5 final round candidates of the SHA-3 competition hosted by N...
In recent years a new type of block ciphers and hash functions over a (large) field, such as MiMC an...
Abstract. In this paper we study the strength of two hash functions which are based on Gen-eralized ...
International audienceIn this paper we study the strength of two hash functions which are based on G...
International audienceWhile generic attacks on classical Feistel schemes and unbalanced Feistel sche...
International audienceWhile generic attacks on classical Feistel schemes and unbalanced Feistel sche...
We propose a new attack on Feistel ciphers with a non-surjective round function such as the CAST cip...
In this paper, we present new generic multiset attacks against generalized Feistel networks, by whic...
Abstract. We show key recovery attacks on generic balanced Feistel ciphers. The analysis is based on...
We show generic attacks on unbalanced Feistel ciphers based on the meet-in-the-middle technique. We ...
Abstract. Unbalanced Feistel schemes with expanding functions are used to construct pseudo-random pe...
We propose a new attack on Feistel ciphers with a non-surjective round function. CAST and LOKI91 are...
Abstract. Feistel structures are an extremely important and exten-sively researched type of cryptogr...
This paper presents new generic attacks on Feistel ciphers that incorporate the key addition at the ...
The Feistel structure is well-known as a good structure for building block ciphers, due to its prope...
The Grøstl hash function is one of the 5 final round candidates of the SHA-3 competition hosted by N...
In recent years a new type of block ciphers and hash functions over a (large) field, such as MiMC an...
Abstract. In this paper we study the strength of two hash functions which are based on Gen-eralized ...
International audienceIn this paper we study the strength of two hash functions which are based on G...
International audienceWhile generic attacks on classical Feistel schemes and unbalanced Feistel sche...
International audienceWhile generic attacks on classical Feistel schemes and unbalanced Feistel sche...
We propose a new attack on Feistel ciphers with a non-surjective round function such as the CAST cip...
In this paper, we present new generic multiset attacks against generalized Feistel networks, by whic...
Abstract. We show key recovery attacks on generic balanced Feistel ciphers. The analysis is based on...
We show generic attacks on unbalanced Feistel ciphers based on the meet-in-the-middle technique. We ...
Abstract. Unbalanced Feistel schemes with expanding functions are used to construct pseudo-random pe...
We propose a new attack on Feistel ciphers with a non-surjective round function. CAST and LOKI91 are...
Abstract. Feistel structures are an extremely important and exten-sively researched type of cryptogr...
This paper presents new generic attacks on Feistel ciphers that incorporate the key addition at the ...
The Feistel structure is well-known as a good structure for building block ciphers, due to its prope...
The Grøstl hash function is one of the 5 final round candidates of the SHA-3 competition hosted by N...
In recent years a new type of block ciphers and hash functions over a (large) field, such as MiMC an...