Abstract
Vortex is a hash function that was first presented at ISC'2008, then submitted to the NIST SHA-3 competition after some modifications. This paper describes several attacks on both versions of Vortex, including collisions, second preimages, preimages, and distinguishers. Our attacks exploit flaws both in the high-level design and in the lower-level algorithms.
| Original language | English |
|---|---|
| Title of host publication | Progress in Cryptology - AFRICACRYPT 2009 - Second International Conference on Cryptology in Africa, Proceedings |
| Pages | 14-28 |
| Number of pages | 15 |
| DOIs | |
| State | Published - 2009 |
| Externally published | Yes |
| Event | 2nd International Conference on Cryptology in Africa, AFRICACRYPT 2009 - Gammarth, Tunisia Duration: 21 Jun 2009 → 25 Jun 2009 |
Publication series
| Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
|---|---|
| Volume | 5580 LNCS |
| ISSN (Print) | 0302-9743 |
| ISSN (Electronic) | 1611-3349 |
Conference
| Conference | 2nd International Conference on Cryptology in Africa, AFRICACRYPT 2009 |
|---|---|
| Country/Territory | Tunisia |
| City | Gammarth |
| Period | 21/06/09 → 25/06/09 |
Bibliographical note
Funding Information:The work in this paper has been supported in part by the European Commission under contract ICT-2007-216646 (ECRYPT II) and by the IAP Programme P6/26 BCRYPT of the Belgian State (Belgian Science Policy).
ASJC Scopus subject areas
- Theoretical Computer Science
- General Computer Science