La lecture à portée de main
Découvre YouScribe en t'inscrivant gratuitement
Je m'inscrisDécouvre YouScribe en t'inscrivant gratuitement
Je m'inscrisDescription
Sujets
Informations
Publié par | pefav |
Nombre de lectures | 24 |
Langue | English |
Extrait
Outline ECHO-256 5-round HF Attack 7-round CF Attack Conclusion
Outline
Improved Analysis of ECHO-256
1 2 3Jérémy Jean María Naya-Plasencia Martin Schläffer
1École Normale Supérieure, France
2FHNW, Windisch, Switzerland
3IAIK, Graz University of Technology, Austria
SAC’2011 – August 11, 2011
SAC’2011 – J. Jean, M. Naya-Plasencia, M. Schläffer – Improved Analysis of ECHO-256 1/23Outline ECHO-256 5-round HF Attack 7-round CF Attack Conclusion
Outline
Outline of the talk
Outline
Previous cryptanalysis
Description of ECHO-256
Collision attack on the 5-round hash function
Distinguisher on the 7-round compression function
Conclusion
SAC’2011 – J. Jean, M. Naya-Plasencia, M. Schläffer – Improved Analysis of ECHO-256 2/23