Exploring SAT for cryptanalysis: (quantum) collision attacks against 6-round SHA-3
From MaRDI portal
Publication:6135452
DOI10.1007/978-3-031-22969-5_22zbMath1530.81054OpenAlexW4320082838MaRDI QIDQ6135452
Guozhen Liu, Yi Tu, Jian Guo, Ling Song
Publication date: 25 August 2023
Published in: Advances in Cryptology – ASIACRYPT 2022 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-22969-5_22
Searching and sorting (68P10) Cryptography (94A60) Hardware implementations of nonnumerical algorithms (VLSI algorithms, etc.) (68W35) Quantum cryptography (quantum-theoretic aspects) (81P94) Computation over the reals, computable analysis (03D78)
Related Items (2)
Collision attacks on round-reduced SHA-3 using conditional internal differentials ⋮ Exploring SAT for cryptanalysis: (quantum) collision attacks against 6-round SHA-3
Cites Work
- Unnamed Item
- A SAT-based preimage analysis of reduced \textsc{Keccak} hash functions
- Improved practical attacks on round-reduced Keccak
- Non-full Sbox linearization: applications to collision attacks on round-reduced \textsc{keccak}
- Estimating the cost of generic quantum pre-image attacks on SHA-2 and SHA-3
- An efficient quantum collision search algorithm and implications on symmetric cryptography
- Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound
- Quantum collision attacks on reduced SHA-256 and SHA-512
- Cryptanalysis of round-reduced KECCAK using non-linear structures
- Preimage attacks on round-reduced Keccak-224/256 via an allocating approach
- Practical collision attacks against round-reduced SHA-3
- Quantum collision attacks on AES-like hashing with low quantum random access memories
- Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials
- Rotational Cryptanalysis of Round-Reduced Keccak
- Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak
- Practical Analysis of Reduced-Round Keccak
- Towards an Optimal CNF Encoding of Boolean Cardinality Constraints
- Differential Propagation Analysis of Keccak
- New Attacks on Keccak-224 and Keccak-256
- Keccak
- New Collision Attacks on Round-Reduced Keccak
- Quantum cryptanalysis of hash and claw-free functions
- Exploring SAT for cryptanalysis: (quantum) collision attacks against 6-round SHA-3
This page was built for publication: Exploring SAT for cryptanalysis: (quantum) collision attacks against 6-round SHA-3