Rebound Attacks on the Reduced Grøstl Hash Function

@inproceedings{Mendel2010ReboundAO,
  title={Rebound Attacks on the Reduced Gr\ostl Hash Function},
  author={Florian Mendel and Christian Rechberger and Martin Schl{\"a}ffer and S\oren S. Thomsen},
  booktitle={CT-RSA},
  year={2010}
}
Grøstl is one of 14 second round candidates of the NIST SHA-3 competition. Cryptanalytic results on the wide-pipe compression function of Grøstl-256 have already been published. However, little is known about the hash function, arguably a much more interesting cryptanalytic setting. Also, Grøstl-512 has not been analyzed yet. In this paper, we show the first cryptanalytic attacks on reduced-round versions of the Grøstl hash functions. These results are obtained by several extensions of the… CONTINUE READING
Highly Cited
This paper has 55 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.

55 Citations

051015'11'13'15'17'19
Citations per Year
Semantic Scholar estimates that this publication has 55 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 12 references

Super-Sbox Cryptanalysis: Improved Attacks for AES-like permutations

IACR Cryptology ePrint Archive • 2009
View 4 Excerpts
Highly Influenced

Grøstl – a SHA-3 candidate. Submission to NIST (2008), available online at http://www.groestl.info

P. Gauravaram, L. R. Knudsen, +4 authors S. S. Thomsen
2008
View 4 Excerpts
Highly Influenced

Understanding Two-Round Differentials in AES

View 12 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…