Showing 1 - 2 results of 2 for search '"Eurocrypt"', query time: 0.06s Refine Results
  1. 1

    Diving deep into the preimage security of AES-like hashing by Chen, Shiyao, Guo, Jian, List, Eik, Shi, Danping, Zhang, Tianyu

    Published 2024
    “…Since the seminal works by Sasaki and Aoki, Meet-in-the-Middle (MITM) attacks are recognized as an effective technique for preimage and collision attacks on hash functions. At Eurocrypt 2021, Bao et al. automated MITM attacks on AES-like hashing and improved upon the best manual result. …”
    Get full text
    Conference Paper
  2. 2

    Towards closing the security gap of Tweak-aNd-Tweak (TNT) by Guo, Chun, Guo, Jian, List, Eik, Song, Ling

    Published 2021
    “…To address this deficit, Bao et al. proposed Tweak-aNd-Tweak (TNT) at EUROCRYPT’20. Their construction chains three calls to independent keyed permutations and adds the unmodified tweak to the state in between the calls. …”
    Get full text
    Conference Paper