|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 7 occurrences of 6 keywords
|
|
|
Results
Found 35 publication records. Showing 35 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
123 | Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen |
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
Grøstl, Maelstrom, hash function, collision attack, Whirlpool, near-collision |
87 | Florian Mendel, Thomas Peyrin, Christian Rechberger, Martin Schläffer |
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
semi-free-start collision, known-key distinguisher, cryptanalysis, block cipher, hash function |
56 | Kazumaro Aoki, Günther Roland, Yu Sasaki, Martin Schläffer |
Byte Slicing Grøstl - Optimized Intel AES-NI and 8-bit Implementations of the SHA-3 Finalist Grøstl. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
56 | Kazumaro Aoki, Krystian Matusiewicz, Günther Roland, Yu Sasaki, Martin Schläffer |
Byte Slicing Grøstl: Improved Intel AES-NI and Vector-Permute Implementations of the SHA-3 Finalist Grøstl. |
ICETE (Selected Papers) |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Rongjia Li, Chenhui Jin, Hongchen Pan |
Integral distinguishers for Grøstl-512 and Kupyna-512 permutation functions. |
IET Inf. Secur. |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Nuray At, Jean-Luc Beuchat, Eiji Okamoto, Ismail San, Teppei Yamazaki |
A low-area unified hardware architecture for the AES and the cryptographic hash function Grøstl. |
J. Parallel Distributed Comput. |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Victor Cauchois, Clément Gomez, Reynald Lercier |
Grøstl Distinguishing Attack: A New Rebound Attack of an AES-like Permutation. |
IACR Trans. Symmetric Cryptol. |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Bingke Ma, Bao Li 0001, Ronglin Hao, Xiaoqian Li |
Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions (Full Version). |
IACR Cryptol. ePrint Arch. |
2015 |
DBLP BibTeX RDF |
|
28 | Bingke Ma, Bao Li 0001, Ronglin Hao, Xiaoqian Li |
Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions. |
IWSEC |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Kota Ideguchi, Elmar Tischhauser, Bart Preneel |
Internal differential collision attacks on the reduced-round Grøstl-0 hash function. |
Des. Codes Cryptogr. |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Florian Mendel, Vincent Rijmen, Martin Schläffer |
Collision Attack on 5 Rounds of Grøstl. |
IACR Cryptol. ePrint Arch. |
2014 |
DBLP BibTeX RDF |
|
28 | Florian Mendel, Vincent Rijmen, Martin Schläffer |
Collision Attack on 5 Rounds of Grøstl. |
FSE |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Yu Sasaki, Yuuki Tokushige, Lei Wang 0031, Mitsugu Iwamoto, Kazuo Ohta |
An Automated Evaluation Tool for Improved Rebound Attack: New Distinguishers and Proposals of ShiftBytes Parameters for Grøstl. |
CT-RSA |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Marcin Rogawski, Kris Gaj, Ekawat Homsirikamol |
A high-speed unified hardware architecture for 128 and 256-bit security levels of AES and the SHA-3 candidate Grøstl. |
Microprocess. Microsystems |
2013 |
DBLP DOI BibTeX RDF |
|
28 | |
Breaking the Even-Mansour Hash Function: Collision and Preimage Attacks on JH and Grøstl. |
IACR Cryptol. ePrint Arch. |
2013 |
DBLP BibTeX RDF |
|
28 | Marine Minier, Gaël Thomas 0002 |
An Integral Distinguisher on Grøstl-512 v3. |
INDOCRYPT |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Kai Guo, Howard M. Heys |
A pipelined implementation of the grØstl hash algorithm and the advanced encryption standard. |
CCECE |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Severin Holzer-Graf, Thomas Krinninger, Martin Pernull, Martin Schläffer, Peter Schwabe, David Seywald, Wolfgang Wieser |
Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implemenations for Grøstl. |
CT-RSA |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Nuray At, Jean-Luc Beuchat, Eiji Okamoto, Ismail San, Teppei Yamazaki |
A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function Grøstl. |
IACR Cryptol. ePrint Arch. |
2012 |
DBLP BibTeX RDF |
|
28 | Jian Zou, Wenling Wu, Shuang Wu 0004, Le Dong |
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl. |
IACR Cryptol. ePrint Arch. |
2012 |
DBLP BibTeX RDF |
|
28 | Shuang Wu 0004, Dengguo Feng, Wenling Wu, Jian Guo 0001, Le Dong, Jian Zou |
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version). |
IACR Cryptol. ePrint Arch. |
2012 |
DBLP BibTeX RDF |
|
28 | Marcin Rogawski, Kris Gaj |
A High-Speed Unified Hardware Architecture for AES and the SHA-3 Candidate Grøstl. |
DSD |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Shuang Wu 0004, Dengguo Feng, Wenling Wu, Jian Guo 0001, Le Dong, Jian Zou |
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others. |
FSE |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Jérémy Jean, María Naya-Plasencia, Thomas Peyrin |
Improved Rebound Attack on the Finalist Grøstl. |
FSE |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Wieland Fischer, Christian A. Reuter |
Differential Fault Analysis on Grøstl. |
FDTC |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Christina Boura, Sylvain Lévêque, David Vigilant |
Side-Channel Analysis of Grøstl and Skein. |
IEEE Symposium on Security and Privacy Workshops |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Elena Andreeva 0001, Bart Mennink, Bart Preneel, Marjan Skrobot |
Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein. |
AFRICACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Bernhard Jungk, Steffen Reith |
On FPGA-Based Implementations of the SHA-3 Candidate Grøstl. |
ReConFig |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Yu Sasaki, Yang Li 0001, Lei Wang 0031, Kazuo Sakiyama, Kazuo Ohta |
Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Kota Ideguchi, Elmar Tischhauser, Bart Preneel |
Improved Collision Attacks on the Reduced-Round Grøstl Hash Function. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Elena Andreeva 0001, Bart Mennink, Bart Preneel |
On the Indifferentiability of the Grøstl Hash Function. |
SCN |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen |
Rebound Attacks on the Reduced Grøstl Hash Function. |
CT-RSA |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Thomas Peyrin |
Improved Differential Attacks for ECHO and Grøstl. |
CRYPTO |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Brian Baldwin, Andrew Byrne, Mark Hamilton, Neil Hanley, Robert P. McEvoy, Weibo Pan, William P. Marnane |
FPGA Implementations of SHA-3 Candidates: CubeHash, Grøstl, Lane, Shabal and Spectral Hash. |
IACR Cryptol. ePrint Arch. |
2009 |
DBLP BibTeX RDF |
|
28 | Praveen Gauravaram, Lars R. Knudsen, Krystian Matusiewicz, Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen |
Grøstl - a SHA-3 candidate. |
Symmetric Cryptography |
2009 |
DBLP BibTeX RDF |
|
Displaying result #1 - #35 of 35 (100 per page; Change: )
|
|