2022
DOI: 10.1007/978-3-031-15802-5_4
|View full text |Cite
|
Sign up to set email alerts
|

Triangulating Rebound Attack on AES-like Hashing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 61 publications
0
2
0
Order By: Relevance
“…In this section, we introduce an improved 19-round free-start collision attack on SKINNY-128-384 MMO hashing mode in classical setting. Aided by the technique developed in the last section, compared with the previously best result of the 5-round inbound phase given in [45], we obtain the first 6-round inbound phase. It's worth noticing that 6-round is the longest rounds covered by the inbound phase due to the constraint on the degree of freedom of the tweakeys.…”
Section: Improved Free-start Collision Attack On Skinny-128-384 Mmo I...mentioning
confidence: 99%
See 1 more Smart Citation
“…In this section, we introduce an improved 19-round free-start collision attack on SKINNY-128-384 MMO hashing mode in classical setting. Aided by the technique developed in the last section, compared with the previously best result of the 5-round inbound phase given in [45], we obtain the first 6-round inbound phase. It's worth noticing that 6-round is the longest rounds covered by the inbound phase due to the constraint on the degree of freedom of the tweakeys.…”
Section: Improved Free-start Collision Attack On Skinny-128-384 Mmo I...mentioning
confidence: 99%
“…In this work, we propose an e cient way to generate a pair that conforms to the low-probability di erential characteristics of AES-like ciphers using the triangulation algorithm. By following the ideas from [45,81], we can hasten the process of finding a key pair conforming to the key di erential trails, regardless of the low probability of the trial. For instance, one key pair of AES-128 key trail in Figure 7.8 and given in Table 7.8 can be found in roughly 2 30 time complexity, despite the original probability being 2 ´126 .…”
Section: From DI Erential Characteristics To Conformable Valuementioning
confidence: 99%