Boomerang and Slide-Rotational Analysis of the SM3 Hash Function
From MaRDI portal
Publication:3455507
DOI10.1007/978-3-642-35999-6_20zbMath1327.94059OpenAlexW1525782700MaRDI QIDQ3455507
Gaoli Wang, Amr M. Youssef, Yanzhao Shen, Aleksandar Kircanski
Publication date: 4 December 2015
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://spectrum.library.concordia.ca/976946/1/youssef2013.pdf
Related Items (3)
Boomerang Attack on Step-Reduced SHA-512 ⋮ Second order collision for the 42-step reduced DHA-256 hash function ⋮ Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA
Cites Work
- Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVAL
- Boomerang Attacks on Hash Function Using Auxiliary Differentials
- Boomerang Attacks on BLAKE-32
- Second-Order Differential Collisions for Reduced SHA-256
- Boomerang Distinguisher for the SIMD-512 Compression Function
- Preimage Attacks on Step-Reduced SM3 Hash Function
- Rotational Cryptanalysis of ARX
- Improved Cryptanalysis of Skein
- How to Break MD5 and Other Hash Functions
- Analysis of a SHA-256 Variant
This page was built for publication: Boomerang and Slide-Rotational Analysis of the SM3 Hash Function