Truncated differential characteristics with minimum number of active bytes for simplified Whirlpool
Prikladnaya Diskretnaya Matematika. Supplement, no. 5 (2012), pp. 41-43.

Voir la notice de l'article provenant de la source Math-Net.Ru

In this paper, a truncated differential characteristics with minimum number of active bytes is built to produce a collision for two reduced variants of the hash function Whirlpool: with 1 and 2 rounds in the underlying block-cypher instead of 14. For the first variant this number equals 23, for the second one – 45. The probabilities of these characteristics are maximal and equal $2^{-115}$ and $2^{-225}$ respectively.
@article{PDMA_2012_5_a21,
     author = {A. A. Kamaeva},
     title = {Truncated differential characteristics with minimum number of active bytes for simplified {Whirlpool}},
     journal = {Prikladnaya Diskretnaya Matematika. Supplement},
     pages = {41--43},
     publisher = {mathdoc},
     number = {5},
     year = {2012},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDMA_2012_5_a21/}
}
TY  - JOUR
AU  - A. A. Kamaeva
TI  - Truncated differential characteristics with minimum number of active bytes for simplified Whirlpool
JO  - Prikladnaya Diskretnaya Matematika. Supplement
PY  - 2012
SP  - 41
EP  - 43
IS  - 5
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDMA_2012_5_a21/
LA  - ru
ID  - PDMA_2012_5_a21
ER  - 
%0 Journal Article
%A A. A. Kamaeva
%T Truncated differential characteristics with minimum number of active bytes for simplified Whirlpool
%J Prikladnaya Diskretnaya Matematika. Supplement
%D 2012
%P 41-43
%N 5
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDMA_2012_5_a21/
%G ru
%F PDMA_2012_5_a21
A. A. Kamaeva. Truncated differential characteristics with minimum number of active bytes for simplified Whirlpool. Prikladnaya Diskretnaya Matematika. Supplement, no. 5 (2012), pp. 41-43. http://geodesic.mathdoc.fr/item/PDMA_2012_5_a21/

[1] Barreto P. S. L. M., Rijmen V., The Whirlpool Hashing Function, Submitted to NESSIE (September 2000) (Revised May 2003) , (2008/12/11) http://www.larc.usp.br/~pbarreto/WhirlpoolPage.html

[2] Information technology – Security techniques – Hash-functions. Part 3: Dedicated hash-functions, ISO/IEC 10118-3:2004, 2004

[3] Lamberger M., Mendel F., Rechberger C., et al., The Rebound Attack and Subspace Distinguishers: Application to Whirlpool, Cryptology ePrint archive, Report 2010/198 , 2010 http://eprint.iacr.org/2010/198