-
1
Diving deep into the preimage security of AES-like hashing
Published 2024“…Since the seminal works by Sasaki and Aoki, Meet-in-the-Middle (MITM) attacks are recognized as an effective technique for preimage and collision attacks on hash functions. At Eurocrypt 2021, Bao et al. automated MITM attacks on AES-like hashing and improved upon the best manual result. …”
Get full text
Conference Paper -
2
Towards closing the security gap of Tweak-aNd-Tweak (TNT)
Published 2021“…To address this deficit, Bao et al. proposed Tweak-aNd-Tweak (TNT) at EUROCRYPT’20. Their construction chains three calls to independent keyed permutations and adds the unmodified tweak to the state in between the calls. …”
Get full text
Conference Paper