Inversion Attacks on Secure Hash Functions Using satSolvers

@inproceedings{De2007InversionAO,
  title={Inversion Attacks on Secure Hash Functions Using satSolvers},
  author={Debapratim De and Abishek Kumarasubramanian and Ramarathnam Venkatesan},
  booktitle={SAT},
  year={2007}
}
Highly Cited
This paper has 51 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 35 extracted citations

Using automatic generation of relaxation constraints to improve the preimage attack on 39-step MD4

2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) • 2018
View 10 Excerpts
Highly Influenced

Encoding Hash Functions as a SAT Problem

2012 IEEE 24th International Conference on Tools with Artificial Intelligence • 2012
View 4 Excerpts
Highly Influenced

Logical Reasoning to Detect Weaknesses About SHA-1 and MD4/5

IACR Cryptology ePrint Archive • 2014
View 6 Excerpts
Highly Influenced

An efficient SAT-based algorithm for finding short cycles in cryptographic algorithms

2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) • 2018
View 1 Excerpt

52 Citations

0510'09'12'15'18
Citations per Year
Semantic Scholar estimates that this publication has 52 citations based on the available data.

See our FAQ for additional information.

Similar Papers

Loading similar papers…