WHIRLPOOL is a hash function designed by Vincent Rijmen and Paulo S. L. M. Barreto that operates on messages less than 2256 bits in length, and produces a message digest of 512 bits. Historically, WHIRLPOOL had three versions. The first version, WHIRLPOOL-0, was submitted to the NESSIE project. Its ”tweaked” successor, WHIRLPOOL-T, was selected for the NESSIE portfolio of cryptographic primitives. A flaw in its diffusion layer reported by Shirai and Shibutani (”On the diffusion matrix employed in the Whirlpool hashing function,” NESSIE public report, 2003) was fixed afterwards, and the final version (called simply WHIRLPOOL for short) was adopted by the International Organization for Standardization (ISO) in the ISO/IEC 10118-3:2004 standard.

References in zbMATH (referenced in 40 articles )

Showing results 1 to 20 of 40.
Sorted by year (citations)

1 2 next

  1. Canteaut, Anne; Duval, Sébastien; Leurent, Gaëtan: Construction of lightweight S-boxes using Feistel and MISTY structures (2016)
  2. Gauravaram, Praveen; Bagheri, Nasour; Knudsen, Lars R.: Building indifferentiable compression functions from the PGV compression functions (2016)
  3. Andreeva, Elena; Mennink, Bart; Preneel, Bart: Open problems in hash function security (2015)
  4. Biryukov, Alex; Perrin, Léo: On reverse-engineering S-boxes with hidden design criteria or structure (2015)
  5. Kölbl, Stefan; Rechberger, Christian: Practical attacks on AES-like cryptographic hash functions (2015)
  6. Lamberger, Mario; Mendel, Florian; Schläffer, Martin; Rechberger, Christian; Rijmen, Vincent: The rebound attack and subspace distinguishers: application to Whirlpool (2015)
  7. Ma, Bingke; Li, Bao; Hao, Ronglin; Li, Xiaoqian: Cryptanalysis of reduced-round Whirlwind (2015)
  8. Todo, Yosuke: Structural evaluation by generalized integral property (2015)
  9. Lee, Jooyoung; Kwon, Daesung: Security of permutation-based compression function \ssflp231 (2014)
  10. Pogorelov, B.A.; Pudovkina, M.A.: On the distance from permutations to the union of all imprimitive groups with identical parameters of imprimitivity systems. (2014)
  11. Wang, Zongyue; Yu, Hongbo; Wang, Xiaoyun: Cryptanalysis of GOST R hash function (2014)
  12. Naito, Yusuke; Sasaki, Yu; Wang, Lei; Yasuda, Kan: Generic state-recovery and forgery attacks on chopmd-MAC and on NMAC/HMAC (2013)
  13. Bernard, Florent; Fischer, Viktor; Costea, Crina; Fouquet, Robert: Implementation of Ring-Oscillators-based Physical Unclonable Functions with independent bits in the response (2012) ioport
  14. Choy, Jiali; Yap, Huihui; Khoo, Khoongming; Guo, Jian; Peyrin, Thomas; Poschmann, Axel; Tan, Chik How: SPN-hash: improving the provable resistance against differential collision attacks (2012)
  15. Yaguchi, Hirotake; Ueda, Sumie: Construction, randomness and security of new hash functions derived from chaos mappings (2012)
  16. Sasaki, Yu: Collisions of MMO-MD5 and their impact on original MD5 (2011)
  17. Sasaki, Yu: Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool (2011)
  18. Sasaki, Yu; Takayanagi, Naoyuki; Sakiyama, Kazuo; Ohta, Kazuo: Experimental verification of super-Sbox analysis -- confirmation of detailed attack complexity (2011)
  19. Sasaki, Yu; Yasuda, Kan: Known-key distinguishers on 11-round Feistel and collision attacks on its hashing modes (2011)
  20. Shibutani, Kyoji: On the diffusion of generalized Feistel structures regarding differential and linear cryptanalysis (2011)

1 2 next