In this work we present first results for the hash function of ECHO. We provide a subspace distinguisher for 5 rounds, near-collisions on 4.5 rounds and collisions for 4 out of 8 rounds of the ECHO-256 hash function. The complexities are $2^{96}$ compression function calls for the distinguisher and near-collision attack, and $2^{64}$ for the collision attack. The memory requirements are $2^{64}$ for all attacks. Furthermore, we provide improved compression function attacks on ECHO-256 to get distinguishers on 7 rounds and near-collisions for 6 and 6.5 rounds. The compression function attacks also apply to ECHO-512. To get these results, we consider new and sparse truncated differential paths through ECHO. We are able to construct these path...
This paper presents differential-based distinguishers against double-branch compression functions an...
Abstract. In this article, we describe a novel collision attack for up to 5 rounds of the Grøstl has...
In a paper published in FSE 2007, a way of obtaining near-collisions and in theory also collisions f...
International audienceIn this paper, we present new results on the second-round SHA-3 candidate ECHO...
International audienceECHO-256 is a second-round candidate of the SHA-3 competition. It is an AES-ba...
Abstract. In this paper, we present new results on the second-round SHA-3 candidate ECHO. We describ...
We analyze the Grøstl hash function, which is a 2nd-round candidate of the SHA-3 competition. Using ...
We present improved cryptanalysis of two second-round SHA-3 candidates: the AES-based hash functions...
In this paper, we improve the recent rebound and start-from-the-middle attacks on AES-like permutati...
RIPEMD-128 is an ISO/IEC standard cryptographic hash function proposed in 1996 by Dobbertin, Bossela...
peer reviewedIn this work, we introduce a new non-random property for hash/compression functions usi...
Abstract. This report presents analysis of the compression function of a recently proposed hash func...
We consider highly structured truncated differential paths to mount rebound attacks on hash function...
We describe a new tool for the search of collisions for hash functions. The tool is applicable when ...
In this paper we present a cryptanalysis of a new 256-bit hash function, FORK-256, proposed by Hong ...
This paper presents differential-based distinguishers against double-branch compression functions an...
Abstract. In this article, we describe a novel collision attack for up to 5 rounds of the Grøstl has...
In a paper published in FSE 2007, a way of obtaining near-collisions and in theory also collisions f...
International audienceIn this paper, we present new results on the second-round SHA-3 candidate ECHO...
International audienceECHO-256 is a second-round candidate of the SHA-3 competition. It is an AES-ba...
Abstract. In this paper, we present new results on the second-round SHA-3 candidate ECHO. We describ...
We analyze the Grøstl hash function, which is a 2nd-round candidate of the SHA-3 competition. Using ...
We present improved cryptanalysis of two second-round SHA-3 candidates: the AES-based hash functions...
In this paper, we improve the recent rebound and start-from-the-middle attacks on AES-like permutati...
RIPEMD-128 is an ISO/IEC standard cryptographic hash function proposed in 1996 by Dobbertin, Bossela...
peer reviewedIn this work, we introduce a new non-random property for hash/compression functions usi...
Abstract. This report presents analysis of the compression function of a recently proposed hash func...
We consider highly structured truncated differential paths to mount rebound attacks on hash function...
We describe a new tool for the search of collisions for hash functions. The tool is applicable when ...
In this paper we present a cryptanalysis of a new 256-bit hash function, FORK-256, proposed by Hong ...
This paper presents differential-based distinguishers against double-branch compression functions an...
Abstract. In this article, we describe a novel collision attack for up to 5 rounds of the Grøstl has...
In a paper published in FSE 2007, a way of obtaining near-collisions and in theory also collisions f...