Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA
From MaRDI portal
Publication:2794507
DOI10.1007/978-3-319-28166-7_16zbMath1459.94122OpenAlexW2294984682MaRDI QIDQ2794507
Publication date: 10 March 2016
Published in: Applied Cryptography and Network Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-28166-7_16
Related Items
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A SAT-based preimage analysis of reduced \textsc{Keccak} hash functions
- The block cipher companion.
- Logical cryptanalysis as a SAT problem: Encoding and analysis of the U. S. Data Encryption Standard
- Preimage and pseudo-collision attacks on step-reduced SM3 hash function
- Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVAL
- Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64
- Boomerang Attacks on BLAKE-32
- Second-Order Differential Collisions for Reduced SHA-256
- Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions
- Preimage Attacks on Step-Reduced SM3 Hash Function
- Boomerang and Slide-Rotational Analysis of the SM3 Hash Function
- Attacking Bivium Using SAT Solvers
- Related-Key Rectangle Attack on 42-Round SHACAL-2
- Related-Key Rectangle Attack of the Full HAS-160 Encryption Mode
- Transform domain analysis of DES
- Finding Collisions for Round-Reduced SM3
- Analysis of Differential Attacks in ARX Constructions
- Improving Local Collisions: New Attacks on Reduced SHA-256
- Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis
- The Return of the Cryptographic Boomerang
- Improved Boomerang Attacks on SM3
- Information Security and Privacy
- How to Break MD5 and Other Hash Functions
- Related-Key Rectangle Attack on the Full SHACAL-1
- Finding Collisions in the Full SHA-1
- The Delicate Issues of Addition with Respect to XOR Differences
- Differential and Rectangle Attacks on Reduced-Round SHACAL-1
- Finding SHA-1 Characteristics: General Results and Applications
- Fast Software Encryption
- Frontiers of Combining Systems
- Applications of SAT Solvers to Cryptanalysis of Hash Functions
- Information Security and Cryptology - ICISC 2005
- Fast Software Encryption