Rebound Attacks on the Reduced Grøstl Hash Function

  title={Rebound Attacks on the Reduced Gr\ostl Hash Function},
  author={Florian Mendel and Christian Rechberger and Martin Schl{\"a}ffer and S\oren S. Thomsen},
Grøstl is one of 14 second round candidates of the NIST SHA-3 competition. Cryptanalytic results on the wide-pipe compression function of Grøstl-256 have already been published. However, little is known about the hash function, arguably a much more interesting cryptanalytic setting. Also, Grøstl-512 has not been analyzed yet. In this paper, we show the first cryptanalytic attacks on reduced-round versions of the Grøstl hash functions. These results are obtained by several extensions of the… CONTINUE READING
Highly Cited
This paper has 55 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.


Publications citing this paper.

55 Citations

Citations per Year
Semantic Scholar estimates that this publication has 55 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 12 references

Super-Sbox Cryptanalysis: Improved Attacks for AES-like permutations

IACR Cryptology ePrint Archive • 2009
View 4 Excerpts
Highly Influenced

Grøstl – a SHA-3 candidate. Submission to NIST (2008), available online at

P. Gauravaram, L. R. Knudsen, +4 authors S. S. Thomsen
View 4 Excerpts
Highly Influenced

Understanding Two-Round Differentials in AES

View 12 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…