Exploring formal methods for cryptographic hash function implementations
From MaRDI portal
Publication:6535484
DOI10.1007/978-3-031-35486-1_9zbMATH Open1545.94075MaRDI QIDQ6535484FDOQ6535484
Authors: Nicky Mouha
Publication date: 11 January 2024
Cites Work
- A Decision Procedure for Bit-Vectors and Arrays
- Finding Collisions in the Full SHA-1
- Tools and Algorithms for the Construction and Analysis of Systems
- Unintended features of APIs: cryptanalysis of incremental HMAC
- A vulnerability in implementations of SHA-3, SHAKE, EdDSA, and other NIST-approved algorithms
This page was built for publication: Exploring formal methods for cryptographic hash function implementations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6535484)