Automatic verification of differential characteristics: application to reduced Gimli
From MaRDI portal
Publication:2102064
DOI10.1007/978-3-030-56877-1_8zbMATH Open1499.94045OpenAlexW3030300659MaRDI QIDQ2102064FDOQ2102064
Authors: Fukang Liu, Takanori Isobe, Willi Meier
Publication date: 7 December 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-56877-1_8
Recommendations
- On the verification of model reduction methods based on the proper generalized decomposition
- scientific article; zbMATH DE number 815479
- Automatic verification of reduction techniques in higher order logic
- Automated verification of refinement laws
- scientific article; zbMATH DE number 804613
- An algorithm for automatically selecting a suitable verification method for linear systems
Cites Work
- Keccak
- Title not available (Why is that?)
- Bounds in shallows and in miseries
- Finding Collisions in the Full SHA-1
- Finding SHA-2 characteristics: searching through a minefield of contradictions
- How to Break MD5 and Other Hash Functions
- Finding SHA-1 Characteristics: General Results and Applications
- Applications of SAT Solvers to Cryptanalysis of Hash Functions
- Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers
- Observations on the \textsf{SIMON} block cipher family
- Cryptanalysis of Ascon
- Construction of differential characteristics in ARX designs application to Skein
- Improved cryptanalysis of Skein
- Duplexing the sponge: Single-pass authenticated encryption and other applications
- Analysis of differential attacks in ARX constructions
- The first collision for full SHA-1
- Applying MILP method to searching integral distinguishers based on division property for 6 lightweight block ciphers
- Automatic verification of differential characteristics: application to reduced Gimli
- Boomerang attacks on BLAKE-32
Cited In (10)
- Automatic search of linear structure: applications to \textsc{Keccak} and \textsc{Ascon}
- A closer look at the S-box: deeper analysis of round-reduced ASCON-HASH
- Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli}
- Analysis of RIPEMD-160: new collision attacks and finding characteristics with MILP
- New records in collision attacks on SHA-2
- Automatic verification of differential characteristics: application to reduced Gimli
- New results on \(\mathsf{Gimli}\): full-permutation distinguishers and improved collisions
- Mind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitions
- Cryptanalysis of full LowMC and LowMC-M with algebraic techniques
- A preimage attack on reduced \textsc{Gimli}-\textsc{Gash}
Uses Software
This page was built for publication: Automatic verification of differential characteristics: application to reduced Gimli
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2102064)