2014
DOI: 10.1007/978-3-319-07536-5_18
|View full text |Cite
|
Sign up to set email alerts
|

Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0
1

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 24 publications
0
7
0
1
Order By: Relevance
“…Ma et al describe a preimage attack that finds a single preimage of GOST-512 reduced to 6 rounds in 2 496 time and 2 64 memory or 2 504 time and 2 11 memory. In the same publication, they describe a collision attack with a time complexity of 2 181 and a memory demand of 2 64 [93]. If the message comprises more than 2 259 blocks, Guo et al describe a second preimage attack on full Streebog-512 with a total time complexity corresponding to 2 266 compression function evaluations [94].…”
Section: Streebogmentioning
confidence: 99%
“…Ma et al describe a preimage attack that finds a single preimage of GOST-512 reduced to 6 rounds in 2 496 time and 2 64 memory or 2 504 time and 2 11 memory. In the same publication, they describe a collision attack with a time complexity of 2 181 and a memory demand of 2 64 [93]. If the message comprises more than 2 259 blocks, Guo et al describe a second preimage attack on full Streebog-512 with a total time complexity corresponding to 2 266 compression function evaluations [94].…”
Section: Streebogmentioning
confidence: 99%
“…The compression function operates in the Miyaguchi-Preneel mode and employs a 12-round AES-like cipher. Cryptoanalysis of Streebog hash function was a subject of intensive research [13][14][15].…”
Section: Sphincs + With Streebog Hash Functionmentioning
confidence: 99%
“…Iwamoto presented a limited birthday distinguisher on 7-round whirlpool in 2013 [11]. And Ma et al improved extended the attack to 7.5 and 9 rounds [12]. Furthermore, Guo et al proposed a universal forgery and key recovery attacks on HMAC based on round-reduced Whirlpool, and a distinguishing-H attack on HMAC based on full Whirlpool [13,14].…”
Section: Introductionmentioning
confidence: 99%