Back to Results
First PageMeta Content
SHA-1 / Preimage attack / SHA-2 / Differential cryptanalysis / RIPEMD / MD4 / Collision attack / MD5 / Keccak / Cryptographic hash functions / Error detection and correction / Cryptography


Improved Boomerang Attacks on Round-Reduced SM3 and Keyed Permutation of BLAKE-256? Dongxia Bai1 , Hongbo Yu1?? , Gaoli Wang2 , Xiaoyun Wang3,4,5 1 Department of Computer Science and Technology, Tsinghua University, Bei
Add to Reading List

Document Date: 2015-04-07 11:46:12


Open Document

File Size: 277,46 KB

Share Result on Facebook

City

HAIFA / /

Company

Fundamental Research Funds / Tsinghua National Laboratory / China 4 Key Laboratory / /

Country

China / /

Currency

pence / /

/

Facility

Key Laboratory of Cryptologic Technology / Tsinghua University / Shandong University / Donghua University / /

IndustryTerm

hash algorithm / candidate algorithms / /

Organization

Chinese Commercial Cryptography Administration Office / Donghua University / Shanghai / Institute for Advanced Study / Department of Computer Science and Technology / National Natural Science Foundation of China / School of Mathematics / Tsinghua University / Beijing / Ministry of Education / School of Computer Science and Technology / G7 / Shandong University / Jinan / /

Person

Ai / /

Position

Corresponding author / /

Product

F16 / /

Technology

block cipher / Cryptography / SHA-3 hash algorithm / stream cipher / Then five SHA-3 candidate algorithms / /

SocialTag