Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials
Offered By: TheIACR via YouTube
Course Description
Overview
Explore a cryptographic analysis presented at FSE 2013 focusing on collision attacks against the SHA-3 hash function. Delve into the research conducted by Itai Dinur, Orr Dunkelman, and Adi Shamir, which examines vulnerabilities in up to 5 rounds of SHA-3 using generalized internal differentials. Gain insights into advanced cryptanalysis techniques and their implications for the security of modern hash functions.
Syllabus
Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials
Taught by
TheIACR
Related Courses
On the Practical - In-Security of 64-bit Block Ciphers - Collision Attacks on HTTP over TLS and OpenVPNAssociation for Computing Machinery (ACM) via YouTube Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS
Black Hat via YouTube How We Created the First SHA-1 Collision and What it Means for Hash Security
Black Hat via YouTube Machine Learning and Side-Channel Analysis - Part 2
TheIACR via YouTube Hash Function Cryptanalysis - Session 14
TheIACR via YouTube