Automatic verification of differential characteristics: application to reduced Gimli
From MaRDI portal
Publication:2102064
DOI10.1007/978-3-030-56877-1_8zbMath1499.94045OpenAlexW3030300659MaRDI QIDQ2102064
Takanori Isobe, Willi Meier, Fukang Liu
Publication date: 7 December 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-56877-1_8
Related Items
Cryptanalysis of full LowMC and LowMC-M with algebraic techniques ⋮ Analysis of RIPEMD-160: new collision attacks and finding characteristics with MILP ⋮ Mind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitions ⋮ Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli} ⋮ Automatic verification of differential characteristics: application to reduced Gimli ⋮ A preimage attack on reduced \textsc{Gimli}-\textsc{Gash}
Uses Software
Cites Work
- Unnamed Item
- The first collision for full SHA-1
- Automatic verification of differential characteristics: application to reduced Gimli
- Cryptanalysis of Ascon
- Bounds in Shallows and in Miseries
- Construction of Differential Characteristics in ARX Designs Application to Skein
- Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications
- Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers
- Boomerang Attacks on BLAKE-32
- Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions
- Observations on the SIMON Block Cipher Family
- Improved Cryptanalysis of Skein
- Analysis of Differential Attacks in ARX Constructions
- Keccak
- How to Break MD5 and Other Hash Functions
- Finding Collisions in the Full SHA-1
- Finding SHA-1 Characteristics: General Results and Applications
- Applications of SAT Solvers to Cryptanalysis of Hash Functions