WHIRLPOOL is a hash function designed by Vincent Rijmen and Paulo S. L. M. Barreto that operates on messages less than 2256 bits in length, and produces a message digest of 512 bits. Historically, WHIRLPOOL had three versions. The first version, WHIRLPOOL-0, was submitted to the NESSIE project. Its ”tweaked” successor, WHIRLPOOL-T, was selected for the NESSIE portfolio of cryptographic primitives. A flaw in its diffusion layer reported by Shirai and Shibutani (”On the diffusion matrix employed in the Whirlpool hashing function,” NESSIE public report, 2003) was fixed afterwards, and the final version (called simply WHIRLPOOL for short) was adopted by the International Organization for Standardization (ISO) in the ISO/IEC 10118-3:2004 standard.

References in zbMATH (referenced in 43 articles )

Showing results 1 to 20 of 43.
Sorted by year (citations)

1 2 3 next

  1. Biryukov, Alex; Perrin, Léo; Udovenko, Aleksei: Reverse-engineering the S-Bbox of Streebog, Kuznyechik and Stribobr1 (2016)
  2. Canteaut, Anne; Duval, Sébastien; Leurent, Gaëtan: Construction of lightweight S-boxes using Feistel and MISTY structures (2016)
  3. Gauravaram, Praveen; Bagheri, Nasour; Knudsen, Lars R.: Building indifferentiable compression functions from the PGV compression functions (2016)
  4. Andreeva, Elena; Mennink, Bart; Preneel, Bart: Open problems in hash function security (2015)
  5. Biryukov, Alex; Perrin, Léo: On reverse-engineering S-boxes with hidden design criteria or structure (2015)
  6. Kanso, A.; Ghebleh, M.: A structure-based chaotic hashing scheme (2015)
  7. Kölbl, Stefan; Rechberger, Christian: Practical attacks on AES-like cryptographic hash functions (2015)
  8. Lamberger, Mario; Mendel, Florian; Schläffer, Martin; Rechberger, Christian; Rijmen, Vincent: The rebound attack and subspace distinguishers: application to Whirlpool (2015)
  9. Ma, Bingke; Li, Bao; Hao, Ronglin; Li, Xiaoqian: Cryptanalysis of reduced-round Whirlwind (2015)
  10. Saarinen, M.-J. O.: \textscStriBob: authenticated encryption from GOST R 34.11-2012 LPS permutation (2015)
  11. Todo, Yosuke: Structural evaluation by generalized integral property (2015)
  12. Lee, Jooyoung; Kwon, Daesung: Security of permutation-based compression function \textsflp231 (2014)
  13. Pogorelov, B. A.; Pudovkina, M. A.: On the distance from permutations to the union of all imprimitive groups with identical parameters of imprimitivity systems. (2014)
  14. Wang, Zongyue; Yu, Hongbo; Wang, Xiaoyun: Cryptanalysis of GOST R hash function (2014)
  15. Naito, Yusuke; Sasaki, Yu; Wang, Lei; Yasuda, Kan: Generic state-recovery and forgery attacks on chopmd-MAC and on NMAC/HMAC (2013)
  16. Bernard, Florent; Fischer, Viktor; Costea, Crina; Fouquet, Robert: Implementation of Ring-Oscillators-based Physical Unclonable Functions with independent bits in the response (2012) ioport
  17. Choy, Jiali; Yap, Huihui; Khoo, Khoongming; Guo, Jian; Peyrin, Thomas; Poschmann, Axel; Tan, Chik How: SPN-hash: improving the provable resistance against differential collision attacks (2012)
  18. Yaguchi, Hirotake; Ueda, Sumie: Construction, randomness and security of new hash functions derived from chaos mappings (2012)
  19. Sasaki, Yu: Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool (2011)
  20. Sasaki, Yu: Collisions of MMO-MD5 and their impact on original MD5 (2011)

1 2 3 next