A comprehensive review of the security flaws of hashing algorithms

A Sadeghi-Nasab, V Rafe - Journal of Computer Virology and Hacking …, 2023 - Springer
The blockchain is an emerging technology. It is widely used because of its efficiency and
functionality. The hash function, as a supporting aspect of the data structure, is critical for …

Biclique cryptanalysis of the full AES

A Bogdanov, D Khovratovich, C Rechberger - Advances in Cryptology …, 2011 - Springer
Since Rijndael was chosen as the Advanced Encryption Standard (AES), improving upon 7-
round attacks on the 128-bit key variant (out of 10 rounds) or upon 8-round attacks on the …

Fast message franking: From invisible salamanders to encryptment

Y Dodis, P Grubbs, T Ristenpart, J Woodage - Advances in Cryptology …, 2018 - Springer
Message franking enables cryptographically verifiable reporting of abusive messages in end-
to-end encrypted messaging. Grubbs, Lu, and Ristenpart recently formalized the needed …

Investigating the avalanche effect of various cryptographically secure hash functions and hash-based applications

D Upadhyay, N Gaikwad, M Zaman, S Sampalli - IEEE Access, 2022 - ieeexplore.ieee.org
In modern cryptography, hash functions are considered as one of the key components for
secure communication. They play a vital role in a wide range of applications such as …

Bicliques for preimages: attacks on Skein-512 and the SHA-2 family

D Khovratovich, C Rechberger, A Savelieva - International Workshop on …, 2012 - Springer
We present a new concept of biclique as a tool for preimage attacks, which employs many
powerful techniques from differential cryptanalysis of block ciphers and hash functions. The …

Quantum collision attacks on reduced SHA-256 and SHA-512

A Hosoyamada, Y Sasaki - Annual International Cryptology Conference, 2021 - Springer
In this paper, we study dedicated quantum collision attacks on SHA-256 and SHA-512 for
the first time. The attacks reach 38 and 39 steps, respectively, which significantly improve the …

Meet-in-the-middle attacks revisited: Key-recovery, collision, and preimage attacks

X Dong, J Hua, S Sun, Z Li, X Wang, L Hu - Advances in Cryptology …, 2021 - Springer
At EUROCRYPT 2021, Bao et al. proposed an automatic method for systematically exploring
the configuration space of meet-in-the-middle (MITM) preimage attacks. We further extend it …

A 3-subset meet-in-the-middle attack: cryptanalysis of the lightweight block cipher KTANTAN

A Bogdanov, C Rechberger - International Workshop on Selected Areas in …, 2010 - Springer
In this paper we describe a variant of existing meet-in-the-middle attacks on block ciphers.
As an application, we propose meet-in-the-middle attacks that are applicable to the …

New records in collision attacks on SHA-2

Y Li, F Liu, G Wang - Annual International Conference on the Theory and …, 2024 - Springer
The SHA-2 family including SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224 and
SHA512/256 is a US federal standard published by NIST. Especially, there is no doubt that …

Differential meet-in-the-middle cryptanalysis

C Boura, N David, P Derbez, G Leander… - Annual International …, 2023 - Springer
In this paper we introduce the differential meet-in-the-middle framework, a new cryptanalysis
technique for symmetric primitives. Our new cryptanalysis method combines techniques from …