In this paper we analyse the security of the SHA-3 candidate ARIRANG. We show that bitwise complementation of whole registers turns out to be very useful for constructing high-probability differential characteristics in the function. We use this approach to find near-collisions with Hamming weight 32 for the full compression function as well as collisions for the compression function of ARIRANG reduced to 26 rounds, both with complexity close to 20 and memory requirements of only a few words.We use near collisions for the compression function to construct pseudo-collisions for the complete hash functions ARIRANG-224 and ARIRANG-384 with complexity 223 and close to 20, respectively.We implemented the attacks and provide examples of appropria...
In a paper published in FSE 2007, a way of obtaining near-collisions and in theory also collisions f...
Abstract. The recently started SHA-3 competition in order to find a new secure hash standard and thu...
In this paper, we present a collision attack on the SHA-3 submission SHAMATA. SHAMATA is a stream ci...
In this paper we analyse the security of the SHA-3 candidate ARIRANG. We show that bitwise complemen...
Abstract. In this paper we analyse the security of the SHA-3 candi-date ARIRANG. We show that bitwis...
Abstract. The EnRUPT hash functions were proposed by O’Neil, Nohl and Henzen [5] as candidates for t...
Abstract. Sarmal is a hash function submitted to the NIST SHA-3 hash function competition. The desig...
The Keccak sponge function family, designed by Bertoni et al. in 2007, was selected by the U.S. Nati...
Recent attacks on hash functions start by constructing a differential characteristic. By finding mes...
The main contributions of this paper are two-fold. Firstly, we present a novel direction in the ...
Abstract. The design principle of Merkle-Damg˚ard construction is collision resistance of the compre...
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of th...
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of th...
In recent years there have been a series of serious and alarming cryptanalytic attacks on several co...
The Keccak hash function is the winner of the SHA-3 competition (2008–2012) and became the SHA-3 sta...
In a paper published in FSE 2007, a way of obtaining near-collisions and in theory also collisions f...
Abstract. The recently started SHA-3 competition in order to find a new secure hash standard and thu...
In this paper, we present a collision attack on the SHA-3 submission SHAMATA. SHAMATA is a stream ci...
In this paper we analyse the security of the SHA-3 candidate ARIRANG. We show that bitwise complemen...
Abstract. In this paper we analyse the security of the SHA-3 candi-date ARIRANG. We show that bitwis...
Abstract. The EnRUPT hash functions were proposed by O’Neil, Nohl and Henzen [5] as candidates for t...
Abstract. Sarmal is a hash function submitted to the NIST SHA-3 hash function competition. The desig...
The Keccak sponge function family, designed by Bertoni et al. in 2007, was selected by the U.S. Nati...
Recent attacks on hash functions start by constructing a differential characteristic. By finding mes...
The main contributions of this paper are two-fold. Firstly, we present a novel direction in the ...
Abstract. The design principle of Merkle-Damg˚ard construction is collision resistance of the compre...
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of th...
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of th...
In recent years there have been a series of serious and alarming cryptanalytic attacks on several co...
The Keccak hash function is the winner of the SHA-3 competition (2008–2012) and became the SHA-3 sta...
In a paper published in FSE 2007, a way of obtaining near-collisions and in theory also collisions f...
Abstract. The recently started SHA-3 competition in order to find a new secure hash standard and thu...
In this paper, we present a collision attack on the SHA-3 submission SHAMATA. SHAMATA is a stream ci...