Rebound Attacks on the Reduced Grøstl Hash Function

@inproceedings{Mendel2010ReboundAO,
  title={Rebound Attacks on the Reduced Gr{\o}stl Hash Function},
  author={F. Mendel and C. Rechberger and Martin Schl{\"a}ffer and S{\o}ren S. Thomsen},
  booktitle={CT-RSA},
  year={2010}
}
  • F. Mendel, C. Rechberger, +1 author Søren S. Thomsen
  • Published in CT-RSA 2010
  • Computer Science, Mathematics
  • Grostl is one of 14 second round candidates of the NIST SHA-3 competition. Cryptanalytic results on the wide-pipe compression function of Grostl-256 have already been published. However, little is known about the hash function, arguably a much more interesting cryptanalytic setting. Also, Grostl-512 has not been analyzed yet. In this paper, we show the first cryptanalytic attacks on reduced-round versions of the Grostl hash functions. These results are obtained by several extensions of the… CONTINUE READING
    The pharmacogenetics of imatinib
    24
    On the Sources of the Feldstein–Horioka Puzzle Across Time and Frequencies
    3
    Seven transmembrane receptors: something old, something new
    268
    SLICOT-Based Computational Tools for CACSD
    1

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 16 REFERENCES
    Splenic infarction and bevacizumab.
    11
    Emerging Issues Analysis in the Hawaii Judiciary, a report published by the Hawaii Judiciary, Honolulu, Hawaii
    • 1980
    Technology and Reality
    10
    Human Mycobacterium ulcerans infections developing at sites of trauma to skin.
    129
    Postwar Pluralism, Brown v. Board of Education, and the Origins of Multicultural Education
    18
    Grøstl - a SHA-3 candidate
    275
    The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
    231