Whirlpool

WHIRLPOOL is a hash function designed by Vincent Rijmen and Paulo S. L. M. Barreto that operates on messages less than 2256 bits in length, and produces a message digest of 512 bits. Historically, WHIRLPOOL had three versions. The first version, WHIRLPOOL-0, was submitted to the NESSIE project. Its ”tweaked” successor, WHIRLPOOL-T, was selected for the NESSIE portfolio of cryptographic primitives. A flaw in its diffusion layer reported by Shirai and Shibutani (”On the diffusion matrix employed in the Whirlpool hashing function,” NESSIE public report, 2003) was fixed afterwards, and the final version (called simply WHIRLPOOL for short) was adopted by the International Organization for Standardization (ISO) in the ISO/IEC 10118-3:2004 standard.


References in zbMATH (referenced in 31 articles )

Showing results 1 to 20 of 31.
Sorted by year (citations)

1 2 next

  1. Gauravaram, Praveen; Bagheri, Nasour; Knudsen, Lars R.: Building indifferentiable compression functions from the PGV compression functions (2016)
  2. Andreeva, Elena; Mennink, Bart; Preneel, Bart: Open problems in hash function security (2015)
  3. Biryukov, Alex; Perrin, Léo: On reverse-engineering S-boxes with hidden design criteria or structure (2015)
  4. Kölbl, Stefan; Rechberger, Christian: Practical attacks on AES-like cryptographic hash functions (2015)
  5. Lamberger, Mario; Mendel, Florian; Schläffer, Martin; Rechberger, Christian; Rijmen, Vincent: The rebound attack and subspace distinguishers: application to Whirlpool (2015)
  6. Todo, Yosuke: Structural evaluation by generalized integral property (2015)
  7. Lee, Jooyoung; Kwon, Daesung: Security of permutation-based compression function \ssflp231 (2014)
  8. Pogorelov, B.A.; Pudovkina, M.A.: On the distance from permutations to the union of all imprimitive groups with identical parameters of imprimitivity systems. (2014)
  9. Wang, Zongyue; Yu, Hongbo; Wang, Xiaoyun: Cryptanalysis of GOST R hash function (2014)
  10. Naito, Yusuke; Sasaki, Yu; Wang, Lei; Yasuda, Kan: Generic state-recovery and forgery attacks on chopmd-MAC and on NMAC/HMAC (2013)
  11. Bernard, Florent; Fischer, Viktor; Costea, Crina; Fouquet, Robert: Implementation of Ring-Oscillators-based Physical Unclonable Functions with independent bits in the response (2012)
  12. Choy, Jiali; Yap, Huihui; Khoo, Khoongming; Guo, Jian; Peyrin, Thomas; Poschmann, Axel; Tan, Chik How: SPN-hash: improving the provable resistance against differential collision attacks (2012)
  13. Yaguchi, Hirotake; Ueda, Sumie: Construction, randomness and security of new hash functions derived from chaos mappings (2012)
  14. Sasaki, Yu; Yasuda, Kan: Known-key distinguishers on 11-round Feistel and collision attacks on its hashing modes (2011)
  15. Barreto, Paulo; Nikov, Ventzislav; Nikova, Svetla; Rijmen, Vincent; Tischhauser, Elmar: Whirlwind: a new cryptographic hash function (2010)
  16. Preneel, Bart: The first 30 years of cryptographic hash functions and the NIST SHA-3 competition (2010)
  17. Lamberger, Mario; Mendel, Florian; Rechberger, Christian; Rijmen, Vincent; Schläffer, Martin: Rebound distinguishers: results on the full Whirlpool compression function (2009)
  18. Matusiewicz, Krystian; Naya-Plasencia, María; Nikolić, Ivica; Sasaki, Yu; Schläffer, Martin: Rebound attack on the full Lane compression function (2009)
  19. Wang, Jie: Computer network security. Theory and practice (2009)
  20. Aumasson, Jean-Philippe; Phan, Raphael C.-W.: How (not) to efficiently dither blockcipher-based hash functions? (2008)

1 2 next