Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Finding SHA-1 characteristics: General results and applications
C De Canniere, C Rechberger - … Conference on the Theory and Application …, 2006 - Springer
The most efficient collision attacks on members of the SHA family presented so far all use
complex characteristics which were manually constructed by Wang et al. In this report, we …
complex characteristics which were manually constructed by Wang et al. In this report, we …
Applications of SAT solvers to cryptanalysis of hash functions
Several standard cryptographic hash functions were broken in 2005. Some essential
building blocks of these attacks lend themselves well to automation by encoding them as …
building blocks of these attacks lend themselves well to automation by encoding them as …
Automatic search for related-key differential characteristics in byte-oriented block ciphers: Application to AES, Camellia, Khazad and others
While differential behavior of modern ciphers in a single secret key scenario is relatively well
understood, and simple techniques for computation of security lower bounds are readily …
understood, and simple techniques for computation of security lower bounds are readily …
Heuristic tool for linear cryptanalysis with applications to CAESAR candidates
Differential and linear cryptanalysis are the general purpose tools to analyze various
cryptographic primitives. Both techniques have in common that they rely on the existence of …
cryptographic primitives. Both techniques have in common that they rely on the existence of …
Analysis of differential attacks in ARX constructions
G Leurent - Advances in Cryptology–ASIACRYPT 2012: 18th …, 2012 - Springer
In this paper, we study differential attacks against ARX schemes. We build upon the
generalized characteristics of de Cannière and Rechberger; we introduce new multi-bit …
generalized characteristics of de Cannière and Rechberger; we introduce new multi-bit …
Construction of differential characteristics in ARX designs application to Skein
G Leurent - Advances in Cryptology–CRYPTO 2013: 33rd Annual …, 2013 - Springer
In this paper, we study differential attacks against ARX schemes. We build upon the
generalized characteristics of De Cannière and Rechberger and the multi-bit constraints of …
generalized characteristics of De Cannière and Rechberger and the multi-bit constraints of …
A new method for searching optimal differential and linear trails in ARX ciphers
Z Liu, Y Li, L Jiao, M Wang - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
In this paper, we propose an automatic tool to search for optimal differential and linear trails
in ARX ciphers. It's shown that a modulo addition can be divided into sequential small …
in ARX ciphers. It's shown that a modulo addition can be divided into sequential small …
Full key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5
Abstract At Crypto'06, Bellare presented new security proofs for HMAC and NMAC, under
the assumption that the underlying compression function is a pseudo-random function …
the assumption that the underlying compression function is a pseudo-random function …
Branching heuristics in differential collision search with applications to SHA-512
In this work, we present practical semi-free-start collisions for SHA-512 on up to 38 (out of
80) steps with complexity 2^ 40.5. The best previously published result was on 24 steps. The …
80) steps with complexity 2^ 40.5. The best previously published result was on 24 steps. The …
New message difference for MD4
This paper proposes several approaches to improve the collision attack on MD4 proposed
by Wang et al. First, we propose a new local collision that is the best for the MD4 collision …
by Wang et al. First, we propose a new local collision that is the best for the MD4 collision …