The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Grøstl with no syntactic query expansion (no support for multi-word queries for performance reasons) in all metadata.

Publication years (Num. hits)
2009-2012 (21) 2013-2020 (14)
Publication types (Num. hits)
article(12) inproceedings(23)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 7 occurrences of 6 keywords

Results
Found 35 publication records. Showing 35 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
123Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Grøstl, Maelstrom, hash function, collision attack, Whirlpool, near-collision
87Florian Mendel, Thomas Peyrin, Christian Rechberger, Martin Schläffer Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF semi-free-start collision, known-key distinguisher, cryptanalysis, block cipher, hash function
56Kazumaro Aoki, Günther Roland, Yu Sasaki, Martin Schläffer Byte Slicing Grøstl - Optimized Intel AES-NI and 8-bit Implementations of the SHA-3 Finalist Grøstl. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
56Kazumaro Aoki, Krystian Matusiewicz, Günther Roland, Yu Sasaki, Martin Schläffer Byte Slicing Grøstl: Improved Intel AES-NI and Vector-Permute Implementations of the SHA-3 Finalist Grøstl. Search on Bibsonomy ICETE (Selected Papers) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Rongjia Li, Chenhui Jin, Hongchen Pan Integral distinguishers for Grøstl-512 and Kupyna-512 permutation functions. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Nuray At, Jean-Luc Beuchat, Eiji Okamoto, Ismail San, Teppei Yamazaki A low-area unified hardware architecture for the AES and the cryptographic hash function Grøstl. Search on Bibsonomy J. Parallel Distributed Comput. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Victor Cauchois, Clément Gomez, Reynald Lercier Grøstl Distinguishing Attack: A New Rebound Attack of an AES-like Permutation. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Bingke Ma, Bao Li 0001, Ronglin Hao, Xiaoqian Li Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions (Full Version). Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
28Bingke Ma, Bao Li 0001, Ronglin Hao, Xiaoqian Li Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions. Search on Bibsonomy IWSEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Kota Ideguchi, Elmar Tischhauser, Bart Preneel Internal differential collision attacks on the reduced-round Grøstl-0 hash function. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Florian Mendel, Vincent Rijmen, Martin Schläffer Collision Attack on 5 Rounds of Grøstl. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
28Florian Mendel, Vincent Rijmen, Martin Schläffer Collision Attack on 5 Rounds of Grøstl. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Yu Sasaki, Yuuki Tokushige, Lei Wang 0031, Mitsugu Iwamoto, Kazuo Ohta An Automated Evaluation Tool for Improved Rebound Attack: New Distinguishers and Proposals of ShiftBytes Parameters for Grøstl. Search on Bibsonomy CT-RSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Marcin Rogawski, Kris Gaj, Ekawat Homsirikamol A high-speed unified hardware architecture for 128 and 256-bit security levels of AES and the SHA-3 candidate Grøstl. Search on Bibsonomy Microprocess. Microsystems The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28 Breaking the Even-Mansour Hash Function: Collision and Preimage Attacks on JH and Grøstl. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
28Marine Minier, Gaël Thomas 0002 An Integral Distinguisher on Grøstl-512 v3. Search on Bibsonomy INDOCRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Kai Guo, Howard M. Heys A pipelined implementation of the grØstl hash algorithm and the advanced encryption standard. Search on Bibsonomy CCECE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Severin Holzer-Graf, Thomas Krinninger, Martin Pernull, Martin Schläffer, Peter Schwabe, David Seywald, Wolfgang Wieser Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implemenations for Grøstl. Search on Bibsonomy CT-RSA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Nuray At, Jean-Luc Beuchat, Eiji Okamoto, Ismail San, Teppei Yamazaki A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function Grøstl. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
28Jian Zou, Wenling Wu, Shuang Wu 0004, Le Dong Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
28Shuang Wu 0004, Dengguo Feng, Wenling Wu, Jian Guo 0001, Le Dong, Jian Zou (Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version). Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
28Marcin Rogawski, Kris Gaj A High-Speed Unified Hardware Architecture for AES and the SHA-3 Candidate Grøstl. Search on Bibsonomy DSD The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Shuang Wu 0004, Dengguo Feng, Wenling Wu, Jian Guo 0001, Le Dong, Jian Zou (Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others. Search on Bibsonomy FSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Jérémy Jean, María Naya-Plasencia, Thomas Peyrin Improved Rebound Attack on the Finalist Grøstl. Search on Bibsonomy FSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Wieland Fischer, Christian A. Reuter Differential Fault Analysis on Grøstl. Search on Bibsonomy FDTC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Christina Boura, Sylvain Lévêque, David Vigilant Side-Channel Analysis of Grøstl and Skein. Search on Bibsonomy IEEE Symposium on Security and Privacy Workshops The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Elena Andreeva 0001, Bart Mennink, Bart Preneel, Marjan Skrobot Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein. Search on Bibsonomy AFRICACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Bernhard Jungk, Steffen Reith On FPGA-Based Implementations of the SHA-3 Candidate Grøstl. Search on Bibsonomy ReConFig The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Yu Sasaki, Yang Li 0001, Lei Wang 0031, Kazuo Sakiyama, Kazuo Ohta Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Kota Ideguchi, Elmar Tischhauser, Bart Preneel Improved Collision Attacks on the Reduced-Round Grøstl Hash Function. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Elena Andreeva 0001, Bart Mennink, Bart Preneel On the Indifferentiability of the Grøstl Hash Function. Search on Bibsonomy SCN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen Rebound Attacks on the Reduced Grøstl Hash Function. Search on Bibsonomy CT-RSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Thomas Peyrin Improved Differential Attacks for ECHO and Grøstl. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Brian Baldwin, Andrew Byrne, Mark Hamilton, Neil Hanley, Robert P. McEvoy, Weibo Pan, William P. Marnane FPGA Implementations of SHA-3 Candidates: CubeHash, Grøstl, Lane, Shabal and Spectral Hash. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2009 DBLP  BibTeX  RDF
28Praveen Gauravaram, Lars R. Knudsen, Krystian Matusiewicz, Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen Grøstl - a SHA-3 candidate. Search on Bibsonomy Symmetric Cryptography The full citation details ... 2009 DBLP  BibTeX  RDF
Displaying result #1 - #35 of 35 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license