Improved boomerang attacks on round-reduced SM3 and keyed permutation of BLAKE-256

Abstract

In this paper we study the security of hash functions SM3 and BLAKE-256 against boomerang attack. SM3 is designed by X. Wang et al. and published by Chinese Commercial Cryptography Administration Office for the use of electronic certification service system in China. BLAKE is one of the five finalists of the NIST SHA-3 competition submitted by J.-P… (More)
DOI: 10.1049/iet-ifs.2013.0380

Topics

10 Figures and Tables