A comprehensive review of the security flaws of hashing algorithms
The blockchain is an emerging technology. It is widely used because of its efficiency and
functionality. The hash function, as a supporting aspect of the data structure, is critical for …
functionality. The hash function, as a supporting aspect of the data structure, is critical for …
Biclique cryptanalysis of the full AES
Since Rijndael was chosen as the Advanced Encryption Standard (AES), improving upon 7-
round attacks on the 128-bit key variant (out of 10 rounds) or upon 8-round attacks on the …
round attacks on the 128-bit key variant (out of 10 rounds) or upon 8-round attacks on the …
Fast message franking: From invisible salamanders to encryptment
Message franking enables cryptographically verifiable reporting of abusive messages in end-
to-end encrypted messaging. Grubbs, Lu, and Ristenpart recently formalized the needed …
to-end encrypted messaging. Grubbs, Lu, and Ristenpart recently formalized the needed …
Investigating the avalanche effect of various cryptographically secure hash functions and hash-based applications
D Upadhyay, N Gaikwad, M Zaman, S Sampalli - IEEE Access, 2022 - ieeexplore.ieee.org
In modern cryptography, hash functions are considered as one of the key components for
secure communication. They play a vital role in a wide range of applications such as …
secure communication. They play a vital role in a wide range of applications such as …
Bicliques for preimages: attacks on Skein-512 and the SHA-2 family
We present a new concept of biclique as a tool for preimage attacks, which employs many
powerful techniques from differential cryptanalysis of block ciphers and hash functions. The …
powerful techniques from differential cryptanalysis of block ciphers and hash functions. The …
Quantum collision attacks on reduced SHA-256 and SHA-512
A Hosoyamada, Y Sasaki - Annual International Cryptology Conference, 2021 - Springer
In this paper, we study dedicated quantum collision attacks on SHA-256 and SHA-512 for
the first time. The attacks reach 38 and 39 steps, respectively, which significantly improve the …
the first time. The attacks reach 38 and 39 steps, respectively, which significantly improve the …
Meet-in-the-middle attacks revisited: Key-recovery, collision, and preimage attacks
At EUROCRYPT 2021, Bao et al. proposed an automatic method for systematically exploring
the configuration space of meet-in-the-middle (MITM) preimage attacks. We further extend it …
the configuration space of meet-in-the-middle (MITM) preimage attacks. We further extend it …
A 3-subset meet-in-the-middle attack: cryptanalysis of the lightweight block cipher KTANTAN
In this paper we describe a variant of existing meet-in-the-middle attacks on block ciphers.
As an application, we propose meet-in-the-middle attacks that are applicable to the …
As an application, we propose meet-in-the-middle attacks that are applicable to the …
New records in collision attacks on SHA-2
Y Li, F Liu, G Wang - Annual International Conference on the Theory and …, 2024 - Springer
The SHA-2 family including SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224 and
SHA512/256 is a US federal standard published by NIST. Especially, there is no doubt that …
SHA512/256 is a US federal standard published by NIST. Especially, there is no doubt that …
Differential meet-in-the-middle cryptanalysis
In this paper we introduce the differential meet-in-the-middle framework, a new cryptanalysis
technique for symmetric primitives. Our new cryptanalysis method combines techniques from …
technique for symmetric primitives. Our new cryptanalysis method combines techniques from …