Exploring formal methods for cryptographic hash function implementations
From MaRDI portal
Publication:6535484
DOI10.1007/978-3-031-35486-1_9zbMATH Open1545.94075MaRDI QIDQ6535484
Publication date: 11 January 2024
Cites Work
- Unintended features of APIs: cryptanalysis of incremental HMAC
- Tools and Algorithms for the Construction and Analysis of Systems
- A Decision Procedure for Bit-Vectors and Arrays
- Finding Collisions in the Full SHA-1
- A vulnerability in implementations of SHA-3, SHAKE, EdDSA, and other NIST-approved algorithms
This page was built for publication: Exploring formal methods for cryptographic hash function implementations