all InfoSec news
Weak-Diffusion Structure: Meet-in-the-Middle Attacks on Sponge-based Hashing Revisited
April 12, 2023, noon |
IACR News www.iacr.org
ePrint Report: Weak-Diffusion Structure: Meet-in-the-Middle Attacks on Sponge-based Hashing Revisited
Lingyue Qin, Boxin Zhao, Jialiang Hua, Xiaoyang Dong, Xiaoyun Wang
Besides the U.S. NIST standard SHA-3(Keccak), another sponge-based primitive Ascon was selected as the NIST standard for lightweight applications, recently. Exploring the security against attacks on the sponge-based hash functions is very important. At EUROCRYPT 2023, Qin et al. introduced the MitM preimage attack framework and the automatic tools for Keccak, Ascon, and Xoodyak.
In this paper, we extend Qin …
applications ascon attack attacks automatic collision eprint report eurocrypt framework functions hash hash functions hashing important mitm mitm attack nist report security sha-3 standard tools
More from www.iacr.org / IACR News
Post-Doc in Lattice-Based Cryptography
1 day, 16 hours ago |
www.iacr.org
WPEC 2024: NIST Workshop on Privacy Enhancing Cryptography
1 day, 16 hours ago |
www.iacr.org
Indistinguishability Obfuscation from Bilinear Maps and LPN Variants
1 day, 20 hours ago |
www.iacr.org
Securing the Future of GenAI: Policy and Technology
1 day, 20 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
CyberSOC Technical Lead
@ Integrity360 | Sandyford, Dublin, Ireland
Cyber Security Strategy Consultant
@ Capco | New York City
Cyber Security Senior Consultant
@ Capco | Chicago, IL
Sr. Product Manager
@ MixMode | Remote, US
Corporate Intern - Information Security (Year Round)
@ Associated Bank | US WI Remote
Senior Offensive Security Engineer
@ CoStar Group | US-DC Washington, DC