The Grøstl hash function is one of the 5 final round candidates of the SHA-3 competition hosted by NIST. In this paper, we study the preimage resistance of the Grøstl hash function. We propose pseudo preimage attacks on Grøstl hash function for both 256-bit and 512-bit versions, i.e. we need to choose the initial value in order to invert the hash function. Pseudo preimage attack on 5(out of 10)-round Grøstl-256 has a complexity of $(2^{244.85},2^{230.13})$ (in time and memory) and pseudo preimage attack on 8(out of 14)-round Grøstl-512 has a complexity of $(2^{507.32},2^{507.00})$. To the best of our knowledge, our attacks are the first (pseudo) preimage attacks on round-reduced Grøstl hash function, including its compression function and o...
International audienceAt CRYPTO 2012, Knellwolf and Khovratovich presented a differential formulatio...
The Kupyna hash function was selected as the new Ukrainian standard DSTU 7564:2014 in 2015. It is de...
International audienceAt CRYPTO 2012, Knellwolf and Khovratovich presented a differential formulatio...
Grøstl is one of the five finalists in the third round of SHA-3 competition hosted by NIST. In this ...
The Grøstl hash function is one of the five finalists in the third round of SHA-3 competition hosted...
In this paper, we present improved preimage attacks on the reduced-round \texttt{GOST} hash function...
Abstract. In this paper, we present improved preimage attacks on the reduced-round GOST hash functio...
We analyze the Grøstl hash function, which is a 2nd-round candidate of the SHA-3 competition. Using ...
Abstract. In August 2012, the Stribog hash function was selected as the new Russian cryptographic ha...
International audienceIn this paper we study the strength of two hash functions which are based on G...
This paper studies two types of attacks on the hash function Shabal. The first attack is a low-weigh...
SM3~\cite{SM3hf} is the Chinese cryptographic hash standard which was announced in 2010 and designed...
Hashing modes are ways to convert a block cipher into a hash function, and those with AES as the und...
TCS\_SHA-3 is a family of four cryptographic hash functions that are covered by an US patent (US 200...
Abstract. In this paper we study the strength of two hash functions which are based on Gen-eralized ...
International audienceAt CRYPTO 2012, Knellwolf and Khovratovich presented a differential formulatio...
The Kupyna hash function was selected as the new Ukrainian standard DSTU 7564:2014 in 2015. It is de...
International audienceAt CRYPTO 2012, Knellwolf and Khovratovich presented a differential formulatio...
Grøstl is one of the five finalists in the third round of SHA-3 competition hosted by NIST. In this ...
The Grøstl hash function is one of the five finalists in the third round of SHA-3 competition hosted...
In this paper, we present improved preimage attacks on the reduced-round \texttt{GOST} hash function...
Abstract. In this paper, we present improved preimage attacks on the reduced-round GOST hash functio...
We analyze the Grøstl hash function, which is a 2nd-round candidate of the SHA-3 competition. Using ...
Abstract. In August 2012, the Stribog hash function was selected as the new Russian cryptographic ha...
International audienceIn this paper we study the strength of two hash functions which are based on G...
This paper studies two types of attacks on the hash function Shabal. The first attack is a low-weigh...
SM3~\cite{SM3hf} is the Chinese cryptographic hash standard which was announced in 2010 and designed...
Hashing modes are ways to convert a block cipher into a hash function, and those with AES as the und...
TCS\_SHA-3 is a family of four cryptographic hash functions that are covered by an US patent (US 200...
Abstract. In this paper we study the strength of two hash functions which are based on Gen-eralized ...
International audienceAt CRYPTO 2012, Knellwolf and Khovratovich presented a differential formulatio...
The Kupyna hash function was selected as the new Ukrainian standard DSTU 7564:2014 in 2015. It is de...
International audienceAt CRYPTO 2012, Knellwolf and Khovratovich presented a differential formulatio...