Boomerang and slide-rotational analysis of the SM3 hash function
From MaRDI portal
Publication:3455507
Recommendations
Cites work
- Analysis of a SHA-256 Variant
- Boomerang Attacks on Hash Function Using Auxiliary Differentials
- Boomerang Distinguisher for the SIMD-512 Compression Function
- Boomerang attacks on BLAKE-32
- Boomerang distinguishers on MD4-family: first practical results on full 5-pass HAVAL
- How to Break MD5 and Other Hash Functions
- Improved cryptanalysis of Skein
- Preimage Attacks on Step-Reduced SM3 Hash Function
- Rotational cryptanalysis of ARX
- Second-order differential collisions for reduced SHA-256
Cited in
(7)- Preimage and pseudo-collision attacks on step-reduced SM3 hash function
- Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA
- Analysis of the Hash Function Design Strategy Called SMASH
- Second order collision for the 42-step reduced DHA-256 hash function
- Boomerang attack on step-reduced SHA-512
- Improved boomerang attacks on SM3
- Finding collisions for round-reduced SM3
This page was built for publication: Boomerang and slide-rotational analysis of the SM3 hash function
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3455507)