International audienceThe hash function Skein is one of the five finalists of the NIST SHA-3 competition. It is based on the block cipher Threefish which only uses three primitive operations: modular addition, rotation and bitwise XOR (ARX). This paper studies the boomerang attacks on Skein-512. Boomerang distinguishers on the compression function reduced to 32 and 36 rounds are proposed, with time complexities 2^104.5 and 2^454 hash computations respectively. Examples of the distinguishers on 28 and 31 rounds are also given. In addition, the boomerang distinguishers are applicable to the key-recovery attacks on reduced Threefish-512. The time complexities for key-recovery attacks reduced to 32-/33-/34-round are about 2^181, 2^305 and 2^424...
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of th...
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of th...
The boomerang attack is a cryptanalysis technique that allows an attacker to concatenate two short d...
International audienceThe hash function Skein is one of the five finalists of the NIST SHA-3 competi...
The hash function Skein is the submission of Ferguson et al. to the NIST Hash Competition, and is ar...
International audienceThe cryptographic hash function SM3 is designed by X. Wang et al. and publishe...
Skein is a new family of cryptographic hash functions. Its design combines speed, security, simplic-...
International audienceThe boomerang attack is a cryptanalysis technique that combines two short diff...
We present high probability differential trails on 2 and 3 rounds of BLAKE-32. Using the trails we a...
Abstract. The Hash function Skein is one of the 5 finalists of NIST SHA-3 competition. It is designe...
The SHA-3 competition organized by NIST aims to find a new hash standard as a replacement of SHA-2. ...
The Advanced Encryption Standard (AES) is a 128-bit block cipher with a user key of 128, 192 or 256 ...
Automatic tools to search for boomerang distinguishers have seen significant advances over the past ...
The recent introduction of the Boomerang Connectivity Table (BCT) at Eurocrypt 2018 revived interest...
Abstract. Square is 8-round SPN structure block cipher and its round function and key schedule have ...
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of th...
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of th...
The boomerang attack is a cryptanalysis technique that allows an attacker to concatenate two short d...
International audienceThe hash function Skein is one of the five finalists of the NIST SHA-3 competi...
The hash function Skein is the submission of Ferguson et al. to the NIST Hash Competition, and is ar...
International audienceThe cryptographic hash function SM3 is designed by X. Wang et al. and publishe...
Skein is a new family of cryptographic hash functions. Its design combines speed, security, simplic-...
International audienceThe boomerang attack is a cryptanalysis technique that combines two short diff...
We present high probability differential trails on 2 and 3 rounds of BLAKE-32. Using the trails we a...
Abstract. The Hash function Skein is one of the 5 finalists of NIST SHA-3 competition. It is designe...
The SHA-3 competition organized by NIST aims to find a new hash standard as a replacement of SHA-2. ...
The Advanced Encryption Standard (AES) is a 128-bit block cipher with a user key of 128, 192 or 256 ...
Automatic tools to search for boomerang distinguishers have seen significant advances over the past ...
The recent introduction of the Boomerang Connectivity Table (BCT) at Eurocrypt 2018 revived interest...
Abstract. Square is 8-round SPN structure block cipher and its round function and key schedule have ...
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of th...
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of th...
The boomerang attack is a cryptanalysis technique that allows an attacker to concatenate two short d...