搜索结果: 1-4 共查到“军队指挥学 ECHO-256”相关记录4条 . 查询时间(0.079 秒)
Improved Analysis of ECHO-256
secret-key cryptography / hash function cryptanalysis rebound attack collision attack distinguisher
2012/3/27
ECHO-256 is a second-round candidate of the SHA-3 competition. It is an AES-based hash function that has attracted a lot of interest and analysis. Up to now, the best known attacks were a distinguishe...
Improved Collisions for Reduced ECHO-256
hash functions SHA-3 competition ECHO cryptanalysis truncated differential path rebound attack collision attack
2010/11/22
In this work, we present a collision attack on 5/8 rounds of the ECHO-256 hash function with a complexity of $2^{112}$ in time and $2^{85.3}$ memory. In this work, we further show that the merge inbou...
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
Cryptanalysis Hash Functions SHA-3 ECHO-256 Collision attack
2010/11/10
In this paper, we present new results on the second-round SHA-3 candidate ECHO. We describe a method to construct a collision in the compression function of ECHO-256 reduced to four rounds in 2^52 ope...
Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function
hash functions SHA-3 competition ECHO cryptanalysis truncated differential paths rebound attack subspace distinguisher near-collisions collision attack
2010/7/13
In this work we present the first results for the ECHO hash function. We provide a subspace distinguisher for 5/8 rounds, near-collisions on 4.5/8 rounds and collisions for 4/8 rounds of the ECHO-256 ...