Florian Mendel

Gimli: a cross-platform permutation

This paper presents Gimli, a 384-bit permutation designed to achieve high security with high performance across a broad range of platforms, including 64-bit Intel/AMD server CPUs, …

daniel-j.-bernstein

Haraka - Efficient Short-Input Hashing for Post-Quantum Applications

Recently, many efficient cryptographic hash function design strategies have been explored, not least because of the SHA-3 competition. These designs are, almost exclusively, geared …

avatar
Stefan Kölbl

Differential Cryptanalysis of Keccak Variants

In October 2012, NIST has announced Keccak as the winner of the SHA-3 cryptographic hash function competition. Recently, at CT-RSA 2013, NIST brought up the idea to standardize …

avatar
Stefan Kölbl

Practical Attacks on the Maelstrom-0 Compression Function

In this paper we present attacks on the compression function of Maelstrom-0. It is based on the Whirlpool hash function standardized by ISO and was designed to be a faster and more …

avatar
Stefan Kölbl