Authors
Senyang Huang, Orna Agmon Ben-Yehuda, Orr Dunkelman, Alexander Maximov
Publication date
2022/9/9
Journal
IACR Transactions on Symmetric Cryptology
Pages
239-270
Description
The Keccak sponge function family, designed by Bertoni et al. in 2007, was selected by the US National Institute of Standards and Technology (NIST) in 2012 as the next generation of Secure Hash Algorithm (SHA-3). Due to its theoretical and practical importance, cryptanalysis of SHA-3 has attracted a lot of attention. Currently, the most powerful collision attack on SHA-3 is Jian Guo et al.’s linearisation technique. However, this technique is infeasible for variants with a
Total citations
2023202432
Scholar articles
S Huang, OA Ben-Yehuda, O Dunkelman, A Maximov - IACR Transactions on Symmetric Cryptology, 2022