Automatic verification of differential characteristics: application to reduced Gimli
From MaRDI portal
Publication:2102064
Recommendations
- On the verification of model reduction methods based on the proper generalized decomposition
- scientific article; zbMATH DE number 815479
- Automatic verification of reduction techniques in higher order logic
- Automated verification of refinement laws
- scientific article; zbMATH DE number 804613
- An algorithm for automatically selecting a suitable verification method for linear systems
Cites work
- scientific article; zbMATH DE number 503238 (Why is no real title available?)
- Analysis of differential attacks in ARX constructions
- Applications of SAT Solvers to Cryptanalysis of Hash Functions
- Applying MILP method to searching integral distinguishers based on division property for 6 lightweight block ciphers
- Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers
- Automatic verification of differential characteristics: application to reduced Gimli
- Boomerang attacks on BLAKE-32
- Bounds in shallows and in miseries
- Construction of differential characteristics in ARX designs application to Skein
- Cryptanalysis of Ascon
- Duplexing the sponge: Single-pass authenticated encryption and other applications
- Finding Collisions in the Full SHA-1
- Finding SHA-1 Characteristics: General Results and Applications
- Finding SHA-2 characteristics: searching through a minefield of contradictions
- How to Break MD5 and Other Hash Functions
- Improved cryptanalysis of Skein
- Keccak
- Observations on the \textsf{SIMON} block cipher family
- The first collision for full SHA-1
Cited in
(10)- A closer look at the S-box: deeper analysis of round-reduced ASCON-HASH
- Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli}
- New results on \(\mathsf{Gimli}\): full-permutation distinguishers and improved collisions
- Analysis of RIPEMD-160: new collision attacks and finding characteristics with MILP
- Automatic search of linear structure: applications to \textsc{Keccak} and \textsc{Ascon}
- Cryptanalysis of full LowMC and LowMC-M with algebraic techniques
- New records in collision attacks on SHA-2
- Automatic verification of differential characteristics: application to reduced Gimli
- Mind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitions
- A preimage attack on reduced \textsc{Gimli}-\textsc{Gash}
This page was built for publication: Automatic verification of differential characteristics: application to reduced Gimli
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2102064)