In this paper we attack round-reduced Keccak hash function with a technique called rotational cryptanalysis. We focus on Keccak variants proposed as SHA-3 candidates in the NIST\u27s contest for a new standard of cryptographic hash function. Our main result is a preimage attack on 4-round Keccak and a 5-round distinguisher on Keccak-f[1600] permutation --- the main building block of Keccak hash function
The Kupyna hash function was selected as the new Ukrainian standard DSTU 7564:2014 in 2015. It is de...
The National Institute of Standards and Technology (NIST) launched in 2008 a public competition, cal...
The conditional cube attack on round-reduced Keccak keyed modes was proposed by Huang et al. at EURO...
In this paper we attack round-reduced Keccak hash function with a technique called rotational crypta...
In this paper, we give the first pre-image attack against 1- round KECCAK-512 hash function, which w...
In this paper, we investigate Keccak --- the cryptographic hash function adopted as the SHA-3 standa...
On October 2-nd 2012 NIST announced its selection of the Keccak scheme as the new SHA-3 hash standar...
International audienceIn this paper, we comprehensively study the resistance of keyed variants of SH...
Abstract. In this paper, we comprehensively study the resistance of keyed variants of SHA-3 (Keccak)...
The Keccak hash function is the winner of the SHA-3 competition (2008–2012) and became the SHA-3 sta...
The Keccak hash function is the winner of the SHA-3 competition and became the SHA-3 standard of NIS...
Abstract. We analyze the internal permutations of Keccak, one of the NIST SHA-3 competition finalist...
The Keccak sponge function family, designed by Bertoni et al. in 2007, was selected by the U.S. Nati...
In this paper, we propose a new MILP modeling to find better or even optimal choices of conditional ...
In this short note we give an observation about the SHA- 3 candidate Keccak[r,c,d], where the parame...
The Kupyna hash function was selected as the new Ukrainian standard DSTU 7564:2014 in 2015. It is de...
The National Institute of Standards and Technology (NIST) launched in 2008 a public competition, cal...
The conditional cube attack on round-reduced Keccak keyed modes was proposed by Huang et al. at EURO...
In this paper we attack round-reduced Keccak hash function with a technique called rotational crypta...
In this paper, we give the first pre-image attack against 1- round KECCAK-512 hash function, which w...
In this paper, we investigate Keccak --- the cryptographic hash function adopted as the SHA-3 standa...
On October 2-nd 2012 NIST announced its selection of the Keccak scheme as the new SHA-3 hash standar...
International audienceIn this paper, we comprehensively study the resistance of keyed variants of SH...
Abstract. In this paper, we comprehensively study the resistance of keyed variants of SHA-3 (Keccak)...
The Keccak hash function is the winner of the SHA-3 competition (2008–2012) and became the SHA-3 sta...
The Keccak hash function is the winner of the SHA-3 competition and became the SHA-3 standard of NIS...
Abstract. We analyze the internal permutations of Keccak, one of the NIST SHA-3 competition finalist...
The Keccak sponge function family, designed by Bertoni et al. in 2007, was selected by the U.S. Nati...
In this paper, we propose a new MILP modeling to find better or even optimal choices of conditional ...
In this short note we give an observation about the SHA- 3 candidate Keccak[r,c,d], where the parame...
The Kupyna hash function was selected as the new Ukrainian standard DSTU 7564:2014 in 2015. It is de...
The National Institute of Standards and Technology (NIST) launched in 2008 a public competition, cal...
The conditional cube attack on round-reduced Keccak keyed modes was proposed by Huang et al. at EURO...