Completed
Frame of Preimage Attack
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Hash Function Cryptanalysis - Session 14
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 KECCAK hash functions
- 3 Inner collision attack on the sponge mode
- 4 General description of the attack
- 5 Summary of our results
- 6 Abstract
- 7 Research problem
- 8 Related work
- 9 Methodology
- 10 Outline
- 11 Round Function of Keccak-f
- 12 Frame of Linear Analysis
- 13 Improvement of Old Strategy
- 14 Freedom Reuse Strategy
- 15 Improved Preimage Attack
- 16 Zero Coefficient
- 17 Bit Recovery
- 18 Freedom Return
- 19 Analysis Results
- 20 Frame of Preimage Attack
- 21 Motivation
- 22 Hirose's Compression Function (HCF)
- 23 Finding Collisions on HCF
- 24 Generic Classical Methods to Find Collisions
- 25 Generic Quantum Methods to Find Collisions
- 26 Rebound Attack Assumption
- 27 Classical Rebound Attack to Find Collisions
- 28 New Differential Trail for 10-round AES-256
- 29 Quantum Collision Attack on 10-Round HCF-AES-256
- 30 Summary of Our Attacks on HCF-AES-256
- 31 Conclusion and Future Works
- 32 Grover's Algorithm
- 33 Super S-box Cryptanalysis Gilbert and Peyrin (4)
- 34 Rebound Attack by Mendel et al. 3 at FSE 2009.
- 35 Collision attack on 9-round Simpira-2
- 36 (Quantum) Collision attack on 11-round Simpira-4
- 37 Collision Attacks on Other Variants of Simpira-4
- 38 Summary of the results for Simpira v2