中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR  > 信息安全国家重点实验室  > 会议论文
题名:
cryptanalysis of the lane hash function
作者: Wu Shuang ; Feng Dengguo ; Wu Wenling
会议文集: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
会议名称: 16th Annual International Workshop on Selected Areas Cryptography
会议日期: AUG 13-14,
出版日期: 2009
会议地点: Calgary, CANADA
关键词: hash function ; collision attack ; rebound attack ; LANE ; SHA-3 candidates
出版者: SELECTED AREAS IN CRYPTOGRAPHY
出版地: HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
ISSN: 0302-9743
ISBN: 978-3-642-05443-3
部门归属: Wu, Shuang; Feng, Dengguo; Wu, Wenling Chinese Acad Sci, State Key Lab Informat Secur, Inst Software, Beijing 100190, Peoples R China.
主办者: Int Assoc Cryptol Res
英文摘要: The LANE4 hash function is designed by Sebastiaan In-desteege and Bart Preneel. It is now a first round candidate of NISTs SHA-3 competition. The LANE hash function contains four concrete designs with different digest length of 224, 256, 384 and 512. The LANE hash function uses two permutations P and Q, which consist of different number of AES1-like rounds. LANE-224/256 uses 6-round P and 3-round Q. LANE-384/512 uses 8-round P and 4-round Q. We will use LANE-n-(a,b) to denote a. variant of LANE with a-round P, b-round Q and a digest length n. We have found a semi-free start collision attack on reduced-round LANE-256-(3,3) with complexity of 2(62) compression function evaluations and 2(69) memory. This technique call be applied to LANE-512-(3,4) to get a semi-free start collision attack with the same complexity of 2(62) and 2(69) memory. We also propose a collision attack on LANE-512-(3,4) with complexity of 2(94) and 2(133) memory.
内容类型: 会议论文
URI标识: http://ir.iscas.ac.cn/handle/311060/8216
Appears in Collections:信息安全国家重点实验室_会议论文

Files in This Item:

There are no files associated with this item.


Recommended Citation:
Wu Shuang,Feng Dengguo,Wu Wenling. cryptanalysis of the lane hash function[C]. 见:16th Annual International Workshop on Selected Areas Cryptography. Calgary, CANADA. AUG 13-14,.
Service
Recommend this item
Sava as my favorate item
Show this item's statistics
Export Endnote File
Google Scholar
Similar articles in Google Scholar
[Wu Shuang]'s Articles
[Feng Dengguo]'s Articles
[Wu Wenling]'s Articles
CSDL cross search
Similar articles in CSDL Cross Search
[Wu Shuang]‘s Articles
[Feng Dengguo]‘s Articles
[Wu Wenling]‘s Articles
Related Copyright Policies
Null
Social Bookmarking
Add to CiteULike Add to Connotea Add to Del.icio.us Add to Digg Add to Reddit
所有评论 (0)
暂无评论
 
评注功能仅针对注册用户开放,请您登录
您对该条目有什么异议,请填写以下表单,管理员会尽快联系您。
内 容:
Email:  *
单位:
验证码:   刷新
您在IR的使用过程中有什么好的想法或者建议可以反馈给我们。
标 题:
 *
内 容:
Email:  *
验证码:   刷新

Items in IR are protected by copyright, with all rights reserved, unless otherwise indicated.

 

 

Valid XHTML 1.0!
Copyright © 2007-2017  中国科学院软件研究所 - Feedback
Powered by CSpace