Hash Function Cryptanalysis - Session 14

Hash Function Cryptanalysis - Session 14

TheIACR via YouTube Direct link

Freedom Reuse Strategy

14 of 38

14 of 38

Freedom Reuse Strategy

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Hash Function Cryptanalysis - Session 14

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 KECCAK hash functions
  3. 3 Inner collision attack on the sponge mode
  4. 4 General description of the attack
  5. 5 Summary of our results
  6. 6 Abstract
  7. 7 Research problem
  8. 8 Related work
  9. 9 Methodology
  10. 10 Outline
  11. 11 Round Function of Keccak-f
  12. 12 Frame of Linear Analysis
  13. 13 Improvement of Old Strategy
  14. 14 Freedom Reuse Strategy
  15. 15 Improved Preimage Attack
  16. 16 Zero Coefficient
  17. 17 Bit Recovery
  18. 18 Freedom Return
  19. 19 Analysis Results
  20. 20 Frame of Preimage Attack
  21. 21 Motivation
  22. 22 Hirose's Compression Function (HCF)
  23. 23 Finding Collisions on HCF
  24. 24 Generic Classical Methods to Find Collisions
  25. 25 Generic Quantum Methods to Find Collisions
  26. 26 Rebound Attack Assumption
  27. 27 Classical Rebound Attack to Find Collisions
  28. 28 New Differential Trail for 10-round AES-256
  29. 29 Quantum Collision Attack on 10-Round HCF-AES-256
  30. 30 Summary of Our Attacks on HCF-AES-256
  31. 31 Conclusion and Future Works
  32. 32 Grover's Algorithm
  33. 33 Super S-box Cryptanalysis Gilbert and Peyrin (4)
  34. 34 Rebound Attack by Mendel et al. 3 at FSE 2009.
  35. 35 Collision attack on 9-round Simpira-2
  36. 36 (Quantum) Collision attack on 11-round Simpira-4
  37. 37 Collision Attacks on Other Variants of Simpira-4
  38. 38 Summary of the results for Simpira v2

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.