×
Improved Boomerang Attacks on Round-Reduced SM3 and Keyed. Permutation of ... Then we show some incompatible problems existed in the previous boomerang attacks on ...
In this paper, we apply the boomerang attack to SM3 compression function, and present such distinguishers on up to 34/35/36/37 steps out of 64 steps, with time ...
May 1, 2015 · In this study, the authors study the security of hash functions SM3 and BLAKE-256 against boomerang attack. SM3 is designed by Wang et al.
In this paper, we apply the boomerang attack to SM3 compression function, and present such distinguishers on up to 34/35/36/37 steps out of 64 steps, with time ...
In this work, we study the security of the Chinese hash function standard SM3, and show the application of boomerang attack to step- reduced SM3 compression ...
In this study, the authors study the security of hash functions SM3 and BLAKE-256 against boomerang attack. SM3 is designed by Wang et al. and published by ...
The boomerang attack is applied to SM3 compression function, and distinguishers on up to 34/35/36/37 steps out of 64 steps, with time complexities 231.4, ...
Improved boomerang attacks on round‐reduced SM3 and keyed permutation of BLAKE‐256 · List of references · Publications that cite this publication.
A preimage attack on 30-step SM3 is proposed. Furthermore, we improve the 37-step boomerang attack and extend it to the 38-step boomerang attack. A summary of ...
Improved boomerang attacks on round-reduced SM3 and keyed permutation of BLAKE-256. Dongxia Bai (1) , Hongbo Yu (2, 1) , Gaoli Wang (3) , Xiaoyun Wang (4, 2).