Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
We fix the flaws and then show that the amended version of SHAMATA-BC is much weaker. We believe that there is no connection between security level of SHAMATA ...
Abstract. We state the design flaws of the 1-round block cipher SHA-. MATA-BC, designed by Fleishmann and Gorski by using the building blocks of SHAMATA ...
Abstract: We state the design flaws of the 1-round block cipher SHA\-MATA-BC, designed by Fleishmann and Gorski by using the building blocks of SHAMATA hash ...
https://dblp.org/rec/journals/iacr/AtalayKK08. Adem Atalay, Orhun Kara, Ferhat Karakoç: Improved Cryptanalysis of SHAMATA-BC. IACR Cryptol. ePrint Arch. 2008 ...
We present a second preimage attack on SHAMATA-512, which is a hash function of 512-bit output and one of the first round candidates of the SHA-3 ...
[Resource Topic] 2008/513: Improved Cryptanalysis of SHAMATA-BC · 2008-513. 0 ... [Resource Topic] 2008/445: Cryptanalysis of the Improved Cellular Message ...
We state the design flaws of the 1-round block cipher SHA- MATA-BC, designed by Fleishmann and Gorski by using the building blocks of SHAMATA hash function.
Abstract. In this paper, we present a collision attack on the SHA-3 submission SHAMATA. SHAMATA is a stream cipher-like hash function.
Public-key cryptography · 2008-514. 0, 43, July 30, 2022. [Resource Topic] 2008/513: Improved Cryptanalysis of SHAMATA-BC · Secret-key cryptography · 2008-513.