Abstract. The EnRUPT hash functions were proposed by O’Neil, Nohl and Henzen [5] as candidates for the SHA-3 competition, organised by NIST [4]. The proposal contains seven concrete hash functions, each hav-ing a different digest length. We present a practical collision attack on each of these seven EnRUPT variants. The time complexity of our attack varies from 236 to 240 round computations, depending on the EnRUPT variant, and the memory re-quirements are negligible. We demonstrate that our attack is practical by giving an actual collision example for EnRUPT-256. Key words: EnRUPT, SHA-3 candidate, hash function, collision attack.
In a paper published in FSE 2007, a way of obtaining near-collisions and in theory also collisions f...
Recent attacks on hash functions start by constructing a differential characteristic. By finding mes...
Abstract. In this article, we describe a novel collision attack for up to 5 rounds of the Grøstl has...
Abstract. The EnRUPT hash functions were proposed by O’Neil, Nohl and Henzen as candidates for the S...
The Keccak sponge function family, designed by Bertoni et al. in 2007, was selected by the U.S. Nati...
The Keccak hash function is the winner of the SHA-3 competition (2008–2012) and became the SHA-3 sta...
In this paper we analyse the security of the SHA-3 candidate ARIRANG. We show that bitwise complemen...
In this paper, we present a collision attack on the SHA-3 submission SHAMATA. SHAMATA is a stream ci...
Abstract. The recently started SHA-3 competition in order to find a new secure hash standard and thu...
Abstract. In this paper we analyse the security of the SHA-3 candi-date ARIRANG. We show that bitwis...
Abstract. The design principle of Merkle-Damg˚ard construction is collision resistance of the compre...
Abstract. In this paper, we present new collision search attacks on the hash function SHA-1. We show...
A secure cryptographic hashing function should be resistant to three different scenarios: First, a c...
Abstract. In this paper, we present new collision search attacks on the hash function SHA-1. We show...
The main contributions of this paper are two-fold. Firstly, we present a novel direction in the ...
In a paper published in FSE 2007, a way of obtaining near-collisions and in theory also collisions f...
Recent attacks on hash functions start by constructing a differential characteristic. By finding mes...
Abstract. In this article, we describe a novel collision attack for up to 5 rounds of the Grøstl has...
Abstract. The EnRUPT hash functions were proposed by O’Neil, Nohl and Henzen as candidates for the S...
The Keccak sponge function family, designed by Bertoni et al. in 2007, was selected by the U.S. Nati...
The Keccak hash function is the winner of the SHA-3 competition (2008–2012) and became the SHA-3 sta...
In this paper we analyse the security of the SHA-3 candidate ARIRANG. We show that bitwise complemen...
In this paper, we present a collision attack on the SHA-3 submission SHAMATA. SHAMATA is a stream ci...
Abstract. The recently started SHA-3 competition in order to find a new secure hash standard and thu...
Abstract. In this paper we analyse the security of the SHA-3 candi-date ARIRANG. We show that bitwis...
Abstract. The design principle of Merkle-Damg˚ard construction is collision resistance of the compre...
Abstract. In this paper, we present new collision search attacks on the hash function SHA-1. We show...
A secure cryptographic hashing function should be resistant to three different scenarios: First, a c...
Abstract. In this paper, we present new collision search attacks on the hash function SHA-1. We show...
The main contributions of this paper are two-fold. Firstly, we present a novel direction in the ...
In a paper published in FSE 2007, a way of obtaining near-collisions and in theory also collisions f...
Recent attacks on hash functions start by constructing a differential characteristic. By finding mes...
Abstract. In this article, we describe a novel collision attack for up to 5 rounds of the Grøstl has...