1

Differential Cryptanalysis of Keccak Variants  featured image

Differential Cryptanalysis of Keccak Variants

In October 2012, NIST has announced Keccak as the winner of the SHA-3 cryptographic hash function competition. Recently, at CT-RSA 2013, NIST brought up the idea to standardize …

avatar
Stefan Kölbl
Practical Attacks on the Maelstrom-0 Compression Function featured image

Practical Attacks on the Maelstrom-0 Compression Function

In this paper we present attacks on the compression function of Maelstrom-0. It is based on the Whirlpool hash function standardized by ISO and was designed to be a faster and more …

avatar
Stefan Kölbl