Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems
Abstract In this paper, improved preimage attacks are presented on 3‐round Keccak‐256 and Keccak‐512 and 4‐round Keccak‐256 based on algebraic methods. The authors propose some new properties about the components of Keccak permutation, reconsider the existing preimage attacks, and further refine the...
Saved in:
Main Authors: | Junling Pei, Lusheng Chen |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2023-05-01
|
Series: | IET Information Security |
Subjects: | |
Online Access: | https://doi.org/10.1049/ise2.12103 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges
by: Donagani Ramakrishna, et al.
Published: (2025-01-01) -
A Second Preimage Attack on the XOR Hash Combiner
by: Shiwei Chen, et al.
Published: (2024-01-01) -
New indifferentiability security proof of MDPH hash function
by: Chun Guo, et al.
Published: (2022-07-01) -
Analysis of the amplitude form of the quantum hash function
by: M. F. Ablayev, et al.
Published: (2023-11-01) -
Enhanced Image Retrieval Using Multiscale Deep Feature Fusion in Supervised Hashing
by: Amina Belalia, et al.
Published: (2025-01-01)