搜索结果: 1-3 共查到“rebound attack”相关记录3条 . 查询时间(0.046 秒)
Unaligned Rebound Attack - Application to Keccak
secret-key cryptography / Keccak SHA-3 hash function diff erential cryptanalysis rebound attack
2012/3/27
We analyze the internal permutations of Keccak, one of the NIST SHA-3 competition finalists, in regard to differential properties. By carefully studying the elements composing those permutations, we a...
In this work, we apply the rebound attack to the AES based
SHA-3 candidate Lane. The hash function Lane uses a permutation
based compression function, consisting of a linear message expansion
and 6...
In this work, we apply the rebound attack to the AES based
SHA-3 candidate Lane. The hash function Lane uses a permutation
based compression function, consisting of a linear message expansion
and 6...