Practical collisions for EnRUPT

1Citations
Citations of this article
31Readers
Mendeley users who have this article in their library.

Abstract

The EnRUPT hash functions were proposed by O'Neil, Nohl and Henzen as candidates for the SHA-3 competition, organised by NIST. The proposal contains seven concrete hash functions, each with a different digest length. We present a practical collision attack on each of these seven EnRUPT variants. The time complexity of our attack varies from 2 36 to 2 40 round computations, depending on the EnRUPT variant, and the memory requirements are negligible. We demonstrate that our attack is practical by giving an actual collision example for EnRUPT-256. © 2010 International Association for Cryptologic Research.

Cite

CITATION STYLE

APA

Indesteege, S., & Preneel, B. (2011). Practical collisions for EnRUPT. Journal of Cryptology, 24(1), 1–23. https://doi.org/10.1007/s00145-010-9058-x

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free