Grøstl – a SHA-3 candidate
SHA-3 cryptanalysis by the Grøstl team
Below we list all cryptanalytic work on other SHA-3 candidates in which members of the Grøstl team were involved. You may also want to check the SHA-3 Zoo.
- Jean-Philippe Aumasson, Tor E. Bjørstad, Willi Meier, and Florian Mendel. Observation on the PRE-MIXING step of CHI-256 and CHI-224.
- Jean-Philippe Aumasson, Orr Dunkelman, Florian Mendel, Christian Rechberger, and Søren S. Thomsen. Cryptanalysis of Vortex. In B. Preneel, editor, Progress in Cryptology – AFRICACRYPT 2009, Proceedings, volume 5580 of Lecture Notes in Computer Science, pages 14-28. Springer, 2009.
- Jean-Philippe Aumasson, Jian Guo, Simon Knellwolf, Krystian Matusiewicz, and Willi Meier. Differential and Invertibility Properties of BLAKE. In S. Hong and T. Iwata, editors, Fast Software Encryption 2010, Proceedings, volume 6147 of Lecture Notes in Computer Science, pages 318-332. Springer, 2010.
- P. Gauravaram, L. R. Knudsen, N. Bagheri, and L. Wei. Improved Security Analysis of Fugue-256 (Poster). In U. Parampalli and P. Hawkes, editors, Australasian Conference on Information Security and Privacy (ACISP) 2011, Proceedings, volume 6812 of Lecture Notes in Computer Science, pages 428-432. Springer, 2011.
- Jian Guo, Krystian Matusiewicz, Lars R. Knudsen, San Ling, and Huaxiong Wang. Practical Pseudo-collisions for Hash Functions ARIRANG-224/384. In M. J. Jacobson Jr., V. Rijmen, and R. Safavi-Naini, editors, Selected Areas in Cryptography 2009, Proceedings, volume 5867 of Lecture Notes in Computer Science, pages 141-156. Springer, 2009.
- Jian Guo and Søren S. Thomsen. Deterministic Differential Properties of the BMW compression function. To appear in Selected Areas in Cryptography 2010, Proceedings.
- Sebastiaan Indesteege, Florian Mendel, Bart Preneel, and Martin Schläffer. Practical Collisions for SHAMATA-256. In M. J. Jacobson Jr., V. Rijmen, and R. Safavi-Naini, editors, Selected Areas in Cryptography 2009, Proceedings, volume 5867 of Lecture Notes in Computer Science, pages 1-15. Springer, 2009.
- Praveen Gauravaram, Gaetan Leurent, Florian Mendel, María Naya-Plasencia, Thomas Peyrin, Christian Rechberger, Martin Schläffer. Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512. In D. J. Bernstein and T. Lange, editors, Africacrypt 2010, Proceedings, volume 6055 of Lecture Notes in Computer Science, pages 419-436. Springer, 2010.
- Dmitry Khovratovich, María Naya-Plasencia, Andrea Röck, and Martin Schläffer. Cryptanalysis of Luffa v2 components. To appear in Selected Areas in Cryptography 2010, Proceedings.
- Dmitry Khovratovich, Ivica Nikolić, and Christian Rechberger. Rotational Rebound Attack on Reduced Skein. In M. Abe, editor, Asiacrypt 2010, Proceedings, volume 6477 of Lecture Notes in Computer Science, pages 1-19. Springer, 2010.
- Lars R. Knudsen, Krystian Matusiewicz, and Søren S. Thomsen. Observations on the Shabal keyed permutation.
- Mario Lamberger and Florian Mendel. Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n. In P. Samarati, M. Yung, F. Martinelli, and C. A. Ardagna, editors, Information Security Conference (ISC) 2009, Proceedings, volume 5735 of Lecture Notes in Computer Science, pages 68-78. Springer, 2009.
- Krystian Matusiewicz, María Naya-Plasencia, Ivica Nikolić, Yu Sasaki and Martin Schläffer. Rebound Attack on the Full LANE Compression Function. In M. Matsui, editor, Advances in Cryptology – ASIACRYPT 2009, Proceedings, volume 5912 of Lecture Notes in Computer Science, pages 106-125. Springer, 2009.
- Florian Mendel, Tomislav Nad, and Martin Schläffer. Collision Attack on Boole. In M. Abdalla, D. Pointcheval, P.-A. Fouque, and D. Vergnaud (editors), Applied Cryptography and Network Security 2009, Proceedings, volume 5536 of Lecture Notes in Computer Science, pages 369-381. Springer, 2009.
- Florian Mendel, Christian Rechberger, and Martin Schläffer. Cryptanalysis of Twister. In M. Abdalla, D. Pointcheval, P.-A. Fouque, and D. Vergnaud (editors), Applied Cryptography and Network Security 2009, Proceedings, volume 5536 of Lecture Notes in Computer Science, pages 342-353. Springer, 2009.
- Florian Mendel and Martin Schläffer. Collisions and Preimages for Sarmal.
- Florian Mendel and Martin Schläffer. On Free-Start Collisions and Collisions for TIB3. In P. Samarati, M. Yung, F. Martinelli, and C. A. Ardagna, editors, Information Security Conference (ISC) 2009, Proceedings, volume 5735 of Lecture Notes in Computer Science, pages 95-106. Springer, 2009.
- Florian Mendel and Søren S. Thomsen. An Observation on JH-512.
- Nicky Mouha, Gautham Sekar, Jean-Philippe Aumasson, Thomas Peyrin, Søren S. Thomsen, Meltem Sönmez Turan, and Bart Preneel. Cryptanalysis of the ESSENCE Family of Hash Functions.
- Martin Schläffer. Improved Truncated Differential Analysis of ECHO. To appear in Selected Areas in Cryptography 2010, Proceedings.
- Søren S. Thomsen. Second preimage attack on MeshHash.
- Søren S. Thomsen. Untangled.
- Søren S. Thomsen. Pseudo-cryptanalysis of the Original Blue Midnight Wish. In S. Hong and T. Iwata, editors, Fast Software Encryption 2010, Proceedings, volume 6147 of Lecture Notes in Computer Science, pages 304-317. Springer, 2010.