Rebound attack

Known as: The Rebound Attack 
The rebound attack is a tool in the cryptanalysis of cryptographic hash functions. The attack was first published in 2009 by Florian Mendel… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2009-2017
02420092017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
We consider highly structured truncated differential paths to mount a new rebound attack on Grøstl-512, a hash functions based on… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2017
2017
We consider highly structured truncated differential paths to mount a new rebound attack on Grøstl-512, a hash functions based on… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2012
2012
Grøstl is one of the five finalist hash functions of the SHA-3 competition. For entering this final phase, the designers have… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2011
2011
The hash function JH [20] is one of the five finalists of the NIST SHA-3 hash competition. It has been recently tweaked for the… (More)
  • table 1
  • figure 1
  • figure 2
  • table 2
  • table 3
Is this relevant?
2011
2011
We analyze the internal permutations of Keccak, one of the NIST SHA-3 competition finalists, in regard to differential properties… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2010
2010
We introduce the rebound attack as a variant of differential cryptanalysis on hash functions and apply it to the hash function… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
2010
2010
JH, designed by Wu, is one of the 14 second round candidates in the NIST Hash Competition. This paper presents the first analysis… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
Highly Cited
2009
Highly Cited
2009
In this work, we propose the rebound attack, a new tool for the cryptanalysis of hash functions. The idea of the rebound attack… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2009
2009
In this work, we apply the rebound attack to the AES based SHA-3 candidate Lane. The hash function Lane uses a permutation based… (More)
  • figure 1
  • figure 3
Is this relevant?
2009
2009
In this paper, we propose cryptanalysis of the hash function Cheetah-256. Cheetah is accepted as a first round candidate of SHA-3… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?