Finding SHA-1 characteristics: General results and applications

C De Canniere, C Rechberger - … Conference on the Theory and Application …, 2006 - Springer
The most efficient collision attacks on members of the SHA family presented so far all use
complex characteristics which were manually constructed by Wang et al. In this report, we …

Applications of SAT solvers to cryptanalysis of hash functions

I Mironov, L Zhang - Theory and Applications of Satisfiability Testing-SAT …, 2006 - Springer
Several standard cryptographic hash functions were broken in 2005. Some essential
building blocks of these attacks lend themselves well to automation by encoding them as …

Automatic search for related-key differential characteristics in byte-oriented block ciphers: Application to AES, Camellia, Khazad and others

A Biryukov, I Nikolić - Annual International Conference on the Theory and …, 2010 - Springer
While differential behavior of modern ciphers in a single secret key scenario is relatively well
understood, and simple techniques for computation of security lower bounds are readily …

Heuristic tool for linear cryptanalysis with applications to CAESAR candidates

C Dobraunig, M Eichlseder, F Mendel - … on the Theory and Application of …, 2015 - Springer
Differential and linear cryptanalysis are the general purpose tools to analyze various
cryptographic primitives. Both techniques have in common that they rely on the existence of …

Analysis of differential attacks in ARX constructions

G Leurent - Advances in Cryptology–ASIACRYPT 2012: 18th …, 2012 - Springer
In this paper, we study differential attacks against ARX schemes. We build upon the
generalized characteristics of de Cannière and Rechberger; we introduce new multi-bit …

Construction of differential characteristics in ARX designs application to Skein

G Leurent - Advances in Cryptology–CRYPTO 2013: 33rd Annual …, 2013 - Springer
In this paper, we study differential attacks against ARX schemes. We build upon the
generalized characteristics of De Cannière and Rechberger and the multi-bit constraints of …

A new method for searching optimal differential and linear trails in ARX ciphers

Z Liu, Y Li, L Jiao, M Wang - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
In this paper, we propose an automatic tool to search for optimal differential and linear trails
in ARX ciphers. It's shown that a modulo addition can be divided into sequential small …

Full key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5

PA Fouque, G Leurent, PQ Nguyen - … , Santa Barbara, CA, USA, August 19 …, 2007 - Springer
Abstract At Crypto'06, Bellare presented new security proofs for HMAC and NMAC, under
the assumption that the underlying compression function is a pseudo-random function …

Branching heuristics in differential collision search with applications to SHA-512

M Eichlseder, F Mendel, M Schläffer - International Workshop on Fast …, 2014 - Springer
In this work, we present practical semi-free-start collisions for SHA-512 on up to 38 (out of
80) steps with complexity 2^ 40.5. The best previously published result was on 24 steps. The …

New message difference for MD4

Y Sasaki, L Wang, K Ohta, N Kunihiro - Fast Software Encryption: 14th …, 2007 - Springer
This paper proposes several approaches to improve the collision attack on MD4 proposed
by Wang et al. First, we propose a new local collision that is the best for the MD4 collision …