Back to Results
First PageMeta Content
NIST hash function competition / SHA-2 / Preimage attack / SHA-1 / MD5 / Skein / Threefish / MD4 / Rotational cryptanalysis / Cryptography / Error detection and correction / Cryptographic hash functions


Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family Dmitry Khovratovich1 and Christian Rechberger2 and Alexandra Savelieva3
Add to Reading List

Document Date: 2012-02-07 10:17:20


Open Document

File Size: 491,72 KB

Share Result on Facebook

City

PERM / /

Company

AES / Microsoft / /

Country

United States / Denmark / /

Currency

pence / /

IndustryTerm

initial structure tool / rebound-style algorithm / attack algorithm / collision search / preimage search / message / brute-force search / 2t2 solutions / search space / preimage search complexity / construction algorithms / /

Organization

National Research University Higher School of Economics / /

Person

Aoki / /

Technology

block cipher / attack algorithm / rebound-style algorithm / 3 Biclique construction algorithms / following algorithms / /

SocialTag