International audienceIn this paper, we comprehensively study the resistance of keyed variants of SHA-3 (Keccak) against algebraic attacks. This analysis covers a wide range of key recovery, MAC forgery and other types of attacks, breaking up to 9 rounds (out of the full 24) of the Keccak internal permutation much faster than exhaustive search. Moreover, some of our attacks on the 6-round Keccak are completely practical and were verified on a desktop PC. Our methods combine cube attacks (an algebraic key recovery attack) and related algebraic techniques with structural analysis of the Keccak permutation. These techniques should be useful in future cryptanalysis of Keccak and similar designs.Although our attacks break more rounds than previo...
The Keccak hash function is the winner of the SHA-3 competition (2008–2012) and became the SHA-3 sta...
The Keccak sponge function family, designed by Bertoni et al. in 2007, was selected by the U.S. Nati...
Conditional cube attack is an efficient key-recovery attack on Keccak keyed modes proposed by Huang ...
Abstract. In this paper, we comprehensively study the resistance of keyed variants of SHA-3 (Keccak)...
Abstract. In this paper we mount the cube attack on the Keccak sponge function. The cube attack, for...
Cube-attack-like cryptanalysis on round-reduced Keccak was proposed by Dinur et al. at EUROCRYPT 201...
In this paper, we propose a new MILP modeling to find better or even optimal choices of conditional ...
The conditional cube attack on round-reduced Keccak keyed modes was proposed by Huang et al. at EURO...
In this paper, we investigate Keccak --- the cryptographic hash function adopted as the SHA-3 standa...
In this paper we attack round-reduced Keccak hash function with a technique called rotational crypta...
This paper studies the Keccak-based authenticated encryption (AE) scheme Ketje Sr against cube-like ...
This paper evaluates the secure level of authenticated encryption Ascon against cube-like method. As...
On October 2-nd 2012 NIST announced its selection of the Keccak scheme as the new SHA-3 hash standar...
In this paper, we describe a variant of the cube attack with much better-understood Preprocessing Ph...
Abstract. We analyze the internal permutations of Keccak, one of the NIST SHA-3 competition finalist...
The Keccak hash function is the winner of the SHA-3 competition (2008–2012) and became the SHA-3 sta...
The Keccak sponge function family, designed by Bertoni et al. in 2007, was selected by the U.S. Nati...
Conditional cube attack is an efficient key-recovery attack on Keccak keyed modes proposed by Huang ...
Abstract. In this paper, we comprehensively study the resistance of keyed variants of SHA-3 (Keccak)...
Abstract. In this paper we mount the cube attack on the Keccak sponge function. The cube attack, for...
Cube-attack-like cryptanalysis on round-reduced Keccak was proposed by Dinur et al. at EUROCRYPT 201...
In this paper, we propose a new MILP modeling to find better or even optimal choices of conditional ...
The conditional cube attack on round-reduced Keccak keyed modes was proposed by Huang et al. at EURO...
In this paper, we investigate Keccak --- the cryptographic hash function adopted as the SHA-3 standa...
In this paper we attack round-reduced Keccak hash function with a technique called rotational crypta...
This paper studies the Keccak-based authenticated encryption (AE) scheme Ketje Sr against cube-like ...
This paper evaluates the secure level of authenticated encryption Ascon against cube-like method. As...
On October 2-nd 2012 NIST announced its selection of the Keccak scheme as the new SHA-3 hash standar...
In this paper, we describe a variant of the cube attack with much better-understood Preprocessing Ph...
Abstract. We analyze the internal permutations of Keccak, one of the NIST SHA-3 competition finalist...
The Keccak hash function is the winner of the SHA-3 competition (2008–2012) and became the SHA-3 sta...
The Keccak sponge function family, designed by Bertoni et al. in 2007, was selected by the U.S. Nati...
Conditional cube attack is an efficient key-recovery attack on Keccak keyed modes proposed by Huang ...