peer reviewedWe describe a new tool for the search of collisions for hash functions. The tool is applicable when an attack is based on a differential trail, whose probability determines the complexity of the attack. Using the linear algebra methods we show how to organize the search so that many (in some cases — all) trail conditions are always satisfied thus significantly reducing the number of trials and the overall complexity. The method is illustrated with the collision and second preimage attacks on the compression functions based on Rijndael. We show that slow diffusion in the Rijndael (and AES) key schedule allows to run an attack on a version with a 13-round compression function, and the S-boxes do not prevent the attack. We finally...
The SHA-3 competition organized by NIST aims to find a new hash standard as a replacement of SHA-2. ...
In this paper, we present an improved attack algorithm to find two-block collisions of the hash func...
peer reviewedWe analyse the security of the cryptographic hash function LAKE-256 proposed at FSE 200...
peer reviewedWe describe a new tool for the search of collisions for hash functions. The tool is app...
Abstract. This paper presents improved collision attacks on round-reduced variants of the hash funct...
Knudsen and Preneel (Asiacrypt'96 and Crypto'97) introduced a hash function design in which a linear...
In this note, we report several solutions to the STARK-Friendly Hash Challenge: a competition with t...
In this paper we present concrete collision and preimage attacks on a large class of compression fun...
In this paper we present concrete collision and preimage attacks on a large class of compression fun...
We analyze the Grøstl hash function, which is a 2nd-round candidate of the SHA-3 competition. Using ...
The Zémor-Tillich hash function has remained unbroken since its introduction at CRYPTO'94. We presen...
Recent attacks on hash functions start by constructing a differential characteristic. By finding mes...
The Zemor-Tillich hash function has remained unbroken since its introduction at CRYPTO'94. We presen...
A simple new technique of parallelizing methods for solving search problems which seek collisions in...
Abstract. In this paper we propose the Grindahl hash functions, which are based on components of the...
The SHA-3 competition organized by NIST aims to find a new hash standard as a replacement of SHA-2. ...
In this paper, we present an improved attack algorithm to find two-block collisions of the hash func...
peer reviewedWe analyse the security of the cryptographic hash function LAKE-256 proposed at FSE 200...
peer reviewedWe describe a new tool for the search of collisions for hash functions. The tool is app...
Abstract. This paper presents improved collision attacks on round-reduced variants of the hash funct...
Knudsen and Preneel (Asiacrypt'96 and Crypto'97) introduced a hash function design in which a linear...
In this note, we report several solutions to the STARK-Friendly Hash Challenge: a competition with t...
In this paper we present concrete collision and preimage attacks on a large class of compression fun...
In this paper we present concrete collision and preimage attacks on a large class of compression fun...
We analyze the Grøstl hash function, which is a 2nd-round candidate of the SHA-3 competition. Using ...
The Zémor-Tillich hash function has remained unbroken since its introduction at CRYPTO'94. We presen...
Recent attacks on hash functions start by constructing a differential characteristic. By finding mes...
The Zemor-Tillich hash function has remained unbroken since its introduction at CRYPTO'94. We presen...
A simple new technique of parallelizing methods for solving search problems which seek collisions in...
Abstract. In this paper we propose the Grindahl hash functions, which are based on components of the...
The SHA-3 competition organized by NIST aims to find a new hash standard as a replacement of SHA-2. ...
In this paper, we present an improved attack algorithm to find two-block collisions of the hash func...
peer reviewedWe analyse the security of the cryptographic hash function LAKE-256 proposed at FSE 200...