摘要: Rebound attacks are a state-of-the-art analysis method for hash functions. These cryptanalysis methods based on well chosen differential path and have been applied to several functions from the SHA-3 competition, providing best known in these cases. In this paper we study rebound detail find large number of cases that complexities existing can be improved.