Rotational cryptanalysis

Results: 9



#Item
1

Rotational Cryptanalysis of ARX Dmitry Khovratovich and Ivica Nikoli“c University of Luxembourg , Abstract. In this paper we analyze the security of systems based on

Add to Reading List

Source URL: www.cryptolux.org

Language: English - Date: 2013-09-17 06:26:54
    2Skein / Threefish / Adder / Field-programmable gate array / Cryptographic hash function / Xilinx / Advanced Encryption Standard / ICE / Rotational cryptanalysis / Cryptography / Block ciphers / NIST hash function competition

    Implementing Skein Hash Function on Xilinx Virtex-5 FPGA Platform Men Long, Intel Corporation, 02-Feb-09, VersionIntroduction

    Add to Reading List

    Source URL: www.schneier.com

    Language: English - Date: 2014-03-02 23:18:32
    3Threefish / Rotational cryptanalysis / Cryptographic hash function / Block cipher / Hash function / Cryptanalysis / Cryptography / NIST hash function competition / Skein

    The Skein Hash Function Family NIST Round 3 Tweak Description 25 Oct 2010 Description of Changes The only change to the Skein hash function is in the key schedule parity constant, found in Sectionof the newly subm

    Add to Reading List

    Source URL: www.schneier.com

    Language: English - Date: 2014-03-02 23:18:32
    4NIST hash function competition / Hash function / Rotational cryptanalysis / Cryptanalysis / Threefish / SHA-1 / Cryptography / Cryptographic hash functions / Hashing

    A framework for Measuring and Evaluating the Progress of the Cryptanalysis of the Hash Function Blue Midnight Wish The Blue Midnight Wish team November 15, 2010

    Add to Reading List

    Source URL: people.item.ntnu.no

    Language: English - Date: 2010-11-15 08:00:24
    5RC5 / Rotational symmetry / Advanced Encryption Standard / Rotation / Linear cryptanalysis / MARS / Madryga / Cryptography / Block ciphers / RC6

    On Di erential Properties of Data-Dependent Rotations and Their Use in MARS and RC6

    Add to Reading List

    Source URL: www.crypto-world.com

    Language: English - Date: 2011-04-01 07:20:46
    6NIST hash function competition / SHA-2 / Preimage attack / SHA-1 / MD5 / Skein / Threefish / MD4 / Rotational cryptanalysis / Cryptography / Error detection and correction / Cryptographic hash functions

    Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family Dmitry Khovratovich1 and Christian Rechberger2 and Alexandra Savelieva3

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2012-02-07 10:17:20
    7NIST hash function competition / Skein / Hashing / Threefish / Rotational cryptanalysis / SHA-2 / SHA-1 / Feistel cipher / Stefan Lucks / Cryptography / Error detection and correction / Cryptographic hash functions

    PDF Document

    Add to Reading List

    Source URL: www.skein-hash.info

    Language: English - Date: 2012-03-27 04:10:33
    8Threefish / Skein / Salsa20 / Differential cryptanalysis / MD5 / Mod n cryptanalysis / Key schedule / SHA-1 / Cryptanalysis / Cryptography / Block ciphers / Rotational cryptanalysis

    PDF Document

    Add to Reading List

    Source URL: www.skein-hash.info

    Language: English - Date: 2012-03-27 04:09:19
    9Rotational cryptanalysis / Differential cryptanalysis / ICE / Advantage / Block cipher / Cryptographic hash function / Advanced Encryption Standard / SHA-1 / Cryptography / Threefish / Skein

    PDF Document

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-05-30 13:40:08
    UPDATE