ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
10
views
0
references
Top references
cited by
2
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,286
similar
All similar
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function
Author(s):
I Dinur
,
P. Morawiecki
,
J Pieprzyk
,
M. Srebrny
,
M. STRAUS
,
M Straus
Publication date:
2015
Journal:
Advances in Cryptology – EUROCRYPT 2015
Read this article at
ScienceOpen
Bookmark
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
SDG 10: Reduced Inequalities
Data availability:
Comments
Comment on this article
Sign in to comment
Similar content
4,286
GPU Implementation of the Keccak Hash Function Family
Authors:
Pierre-Louis Cayrel
,
Gerhard Hoffmann
,
Michael Schneider
Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single- and multi-message hashing
Authors:
Abdulkadir Akin
,
Aydin Aysu
,
Onur Can Ulusel
…
Keccak
Authors:
G. BERTONI
,
J. Daemen
,
M PEETERS
…
See all similar
Cited by
2
A RISC-V Processor with Area-Efficient Memristor-Based In-Memory Computing for Hash Algorithm in Blockchain Applications
Authors:
Xiaoyong Xue
,
Chenzedai Wang
,
Wenjun Liu
…
New Results on the SymSum Distinguisher on Round-Reduced SHA3
Authors:
Sahiba Suryawanshi
,
Dhiman Saha
,
Satyam Sachan
See all cited by