Cryptanalysis

Practical Attacks on AES-like Cryptographic Hash Functions featured image

Practical Attacks on AES-like Cryptographic Hash Functions

Despite the great interest in rebound attacks on AES-like hash functions since 2009, we report on a rather generic, albeit keyschedule-dependent, algorithmic improvement: A new …

avatar
Stefan Kölbl

Cryptanalysis of a SHA-3 Candidate

avatar
Stefan Kölbl
Practical Attacks on the Maelstrom-0 Compression Function featured image

Practical Attacks on the Maelstrom-0 Compression Function

In this paper we present attacks on the compression function of Maelstrom-0. It is based on the Whirlpool hash function standardized by ISO and was designed to be a faster and more …

avatar
Stefan Kölbl