Boomerang and slide-rotational analysis of the SM3 hash function
From MaRDI portal
Publication:3455507
DOI10.1007/978-3-642-35999-6_20zbMATH Open1327.94059OpenAlexW1525782700MaRDI QIDQ3455507FDOQ3455507
Authors: Aleksandar Kircanski, Yanzhao Shen, Gaoli Wang, A. M. Youssef
Publication date: 4 December 2015
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://spectrum.library.concordia.ca/976946/1/youssef2013.pdf
Recommendations
Cites Work
- How to Break MD5 and Other Hash Functions
- Preimage Attacks on Step-Reduced SM3 Hash Function
- Boomerang Attacks on Hash Function Using Auxiliary Differentials
- Rotational cryptanalysis of ARX
- Improved cryptanalysis of Skein
- Second-order differential collisions for reduced SHA-256
- Analysis of a SHA-256 Variant
- Boomerang distinguishers on MD4-family: first practical results on full 5-pass HAVAL
- Boomerang attacks on BLAKE-32
- Boomerang Distinguisher for the SIMD-512 Compression Function
Cited In (7)
- Finding collisions for round-reduced SM3
- Second order collision for the 42-step reduced DHA-256 hash function
- Improved boomerang attacks on SM3
- Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA
- Preimage and pseudo-collision attacks on step-reduced SM3 hash function
- Boomerang attack on step-reduced SHA-512
- Analysis of the Hash Function Design Strategy Called SMASH
This page was built for publication: Boomerang and slide-rotational analysis of the SM3 hash function
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3455507)