您当前的位置:
首页 >
文章列表页 >
Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding
academic paper | 更新时间:2024-06-05
    • Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding

    • Journal on Communications   Vol. 35, Issue 2, Pages: 40-45(2014)
    • DOI:10.3969/j.issn.1000-436x.2014.02.006    

      CLC: TP309
    • Online First:2014-02

      Published:25 February 2014

    移动端阅览

  • Gao-li WANG, Yan-zhao SHEN. Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding[J]. Journal on Communications, 2014, 35(2): 40-45. DOI: 10.3969/j.issn.1000-436x.2014.02.006.

  •  
  •  

0

Views

424

下载量

1

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Efficient quantum circuit implementations of SM3 and RIPEMD-160 Hash functions
Improved meet-in-the-middle attack on reduced-round Kiasu-BC algorithm
Meet-in-the-middle attacks on FOX block cipher
Meet-in-the-middle attack on 11-round 3D cipher
Improved meet-in-the-middle attack on ARIA cipher

Related Author

LI Junkang
GUO Nansheng
ZOU Jian
Shaozhen CHEN
Manman LI
IRong-jia L
INChen-hui J
Jiong-jiong REN

Related Institution

College of Computer and Data Science, Fuzhou University
Fujian Provincial Key Laboratory of Network Systems and Information Security, Fuzhou University
College of Cyberspace Security, Information Engineering University
State Key Laboratory of Cryptology
Henan Key Laboratory of Network Cryptography Technology
0