@inproceedings{ce43c96d2940473991990204212f84d6,
title = "Rotational cryptanalysis of round-reduced Keccak",
abstract = "In this paper we attack round-reduced Keccak hash function with a technique called rotational cryptanalysis. We focus on Keccak variants proposed as SHA-3 candidates in the NIST's contest for a new standard of cryptographic hash function. Our main result is a preimage attack on 4-round Keccak and a 5-round distinguisher on Keccak- [1600] permutation - the main building block of Keccak hash function.",
keywords = "Keccak, Preimage attack, Rotational cryptanalysis, SHA-3",
author = "Pawe{\l} Morawiecki and Josef Pieprzyk and Marian Srebrny",
year = "2014",
doi = "10.1007/978-3-662-43933-3_13",
language = "English",
isbn = "9783662439326",
volume = "8424 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer, Springer Nature",
pages = "241--262",
editor = "Shiho Moriai",
booktitle = "Fast Software Encryption - 20th International Workshop, FSE 2013, Revised Selected Papers",
address = "United States",
note = "20th International Workshop on Fast Software Encryption, FSE 2013 ; Conference date: 11-03-2013 Through 13-03-2013",
}