2020 43rd International Convention on Information, Communication and Electronic Technology (MIPRO) 2020
DOI: 10.23919/mipro48935.2020.9245337
|View full text |Cite
|
Sign up to set email alerts
|

Constructing a Set of Weak Values for Full-round MD4 Hash Function

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…In particular, we studied the problem of inversion of function f Biv : {0, 1} 177 → {0, 1} 200 . The cryptanalysis of Trivium was considered as the problem of finding a secret key with a known initial value (IV) of length 80 and the known keystream fragment of length 300 bits, thus in the case of Trivium we analyzed the inversion problem for function f Triv−M : {0, 1} 80 → {0, 1} 300 , where M is the number of initialization steps (the corresponding parameter is a part of the specification of the Trivium algorithm [35]).…”
Section: A Considered Functions and Their Encodingsmentioning
confidence: 99%
See 2 more Smart Citations
“…In particular, we studied the problem of inversion of function f Biv : {0, 1} 177 → {0, 1} 200 . The cryptanalysis of Trivium was considered as the problem of finding a secret key with a known initial value (IV) of length 80 and the known keystream fragment of length 300 bits, thus in the case of Trivium we analyzed the inversion problem for function f Triv−M : {0, 1} 80 → {0, 1} 300 , where M is the number of initialization steps (the corresponding parameter is a part of the specification of the Trivium algorithm [35]).…”
Section: A Considered Functions and Their Encodingsmentioning
confidence: 99%
“…After the initialization phase, Trivium can generate keystream of an arbitrary length. We considered the problems of the kind f Triv−M : {0, 1} 80 → {0, 1} 300 , where by Trivium-M we denote a variant of Trivium with the number of initialization steps equal to M.…”
Section: E Linearizing Set Attacks On Weakened Variants Of Triviummentioning
confidence: 99%
See 1 more Smart Citation