logo

SCIENCE CHINA Information Sciences, Volume 61, Issue 3: 038105(2018) https://doi.org/10.1007/s11432-017-9119-6

Improved cryptanalysis of step-reduced SM3

More info
  • ReceivedMay 15, 2017
  • AcceptedMay 27, 2017
  • PublishedAug 23, 2017

Abstract

There is no abstract available for this article.


Acknowledgment

This work was supported by National Basic Research Program of China (973 Program) (Grant No. 2013CB834205) and National Natural Science Foundation of China (Grant No. 61373142).


References

[1] Standardization Administration of the Peoples Republic of China. Information security techniques — SM3 cryptographic hash algorithm. GB/T 32905-2016. http://www.sac.gov.cn/gzfw/ggcx/gjbzgg/201614/. Google Scholar

[2] Zou J, Wu W, Wu S, et al. Preimage attacks on step-reduced SM3 hash function. In: Proceedings of the 14th International Conference on Information Security and Cryptology. Berlin: Springer-Verlag, 2011. 375--390. Google Scholar

[3] Wang G, Shen Y. Preimage and pseudo-collision attacks on step-reduced SM3 hash function. Inf Proc Lett, 2013, 113: 301--306. Google Scholar

[4] Bai D, Yu H, Wang G, et al. Improved boomerang attacks on SM3. In: Proceedings of the 18th Australasian Conference on Information Security and Privacy. Berlin: Springer-Verlag, 2013. 251--266. Google Scholar

[5] Bai D, Yu H, Wang G, et al. Improved boomerang attacks on round-reduced SM3 and keyed permutation of BLAKE-256. IET Inf Secur, 2014, 9: 167--178. Google Scholar

[6] Knellwolf S, Khovratovich D. New preimage attacks against reduced SHA-1. In: Proceedings of the 32nd Annual Cryptology Conference. Berlin: Springer-Verlag, 2012. 367--383. Google Scholar

[7] Yu H, Chen J, Wang X. The boomerang attacks on the round-reduced Skein-512. In: Proceedings of the 19th International Conference on Selected Areas in Cryptography. Berlin: Springer-Verlag, 2012. 287--303. Google Scholar

Copyright 2019 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1