• Quark

  • Referenced in 22 articles [sw08447]
  • least 64-bit security against all attacks (collisions, multicollisions, distinguishers, etc.), fits in 1379 gate...
  • CubeHash

  • Referenced in 13 articles [sw07100]
  • CubeHash This paper presents improved collision attacks on round-reduced variants of the hash function ... differential trails that lead to lower estimated attack complexities when used within the framework introduced ... such trails lead to much faster collision attacks. We demonstrate this by providing a real ... collision for CubeHash-5/96. The second method randomizes the search for highly probable linear...
  • ARXtools

  • Referenced in 10 articles [sw09727]
  • scenarios: on the one hand we show attacks with a relatively low complexity, in relatively ... free-start and semi-free-start collision attacks for 20 rounds and 12 rounds...
  • Rumba20

  • Referenced in 15 articles [sw07099]
  • version of Salsa20/8, to bring faster attacks on the 7-round variant, and to break ... output. We find collision and preimage attacks for two simplified variants, then we discuss differential ... attacks on the original version, and exploit a high-probability differential to reduce complexity ... collision search from $2^{256}$ to $2^{79}$ for 3-round Rumba. To prove...
  • COFFE

  • Referenced in 1 article [sw15075]
  • motivation of the attack is to find a collision on the input of each ... COFFE instantiations. Having the state collisions, the forgery attack is then conducted by choosing...
  • DryGASCON

  • Referenced in 1 article [sw42325]
  • paper presents practical forgery attacks on DryGASCON by exploiting internal collisions of the underlying permutation ... investigate collisions and discuss how to find them. Next, we mounted forgery attacks on DryGASCON128...
  • BLAKE

  • Referenced in 8 articles [sw11099]
  • security definitions and state-of-the-art collision search methods, and they present SHA1, SHA2 ... properties of BLAKE and describe the best attacks on reduced or modified variants; and they...
  • gmp

  • Referenced in 289 articles [sw00363]
  • GMP is a free library for arbitrary precision...
  • Magma

  • Referenced in 3363 articles [sw00540]
  • Computer algebra system (CAS). Magma is a large...
  • Maple

  • Referenced in 5403 articles [sw00545]
  • The result of over 30 years of cutting...
  • MATCONT

  • Referenced in 455 articles [sw00551]
  • MATCONT: Matlab software for bifurcation study of dynamical...
  • Mathematica

  • Referenced in 6445 articles [sw00554]
  • Almost any workflow involves computing results, and that...
  • Matlab

  • Referenced in 13702 articles [sw00558]
  • MATLAB® is a high-level language and interactive...
  • SageMath

  • Referenced in 2033 articles [sw00825]
  • Sage (SageMath) is free, open-source math software...
  • SCIP

  • Referenced in 554 articles [sw01091]
  • SCIP is currently one of the fastest non...
  • PRISM

  • Referenced in 454 articles [sw01186]
  • PRISM: Probabilistic symbolic model checker. In this paper...
  • MACSYMA

  • Referenced in 721 articles [sw01209]
  • Macsyma is a general purpose symbolic-numerical-graphical...
  • VEST

  • Referenced in 26 articles [sw01405]
  • VEST -- a toolset for constructing and analyzing component...
  • McEliece

  • Referenced in 264 articles [sw02076]
  • Practical power analysis attacks on software implementations of...
  • HAVAL

  • Referenced in 46 articles [sw02156]
  • HAVAL is a cryptographic hash function. Unlike MD5...