Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDMA_2015_8_a53, author = {I. A. Bogachkova and O. S. Zaikin and S. E. Kochemazov and I. V. Otpuschennikov and A. A. Semenov}, title = {Application of algorithms solving {SAT} problem to cryptanalysis of hash functions of {MD} family}, journal = {Prikladnaya Diskretnaya Matematika. Supplement}, pages = {139--142}, publisher = {mathdoc}, number = {8}, year = {2015}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDMA_2015_8_a53/} }
TY - JOUR AU - I. A. Bogachkova AU - O. S. Zaikin AU - S. E. Kochemazov AU - I. V. Otpuschennikov AU - A. A. Semenov TI - Application of algorithms solving SAT problem to cryptanalysis of hash functions of MD family JO - Prikladnaya Diskretnaya Matematika. Supplement PY - 2015 SP - 139 EP - 142 IS - 8 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/PDMA_2015_8_a53/ LA - ru ID - PDMA_2015_8_a53 ER -
%0 Journal Article %A I. A. Bogachkova %A O. S. Zaikin %A S. E. Kochemazov %A I. V. Otpuschennikov %A A. A. Semenov %T Application of algorithms solving SAT problem to cryptanalysis of hash functions of MD family %J Prikladnaya Diskretnaya Matematika. Supplement %D 2015 %P 139-142 %N 8 %I mathdoc %U http://geodesic.mathdoc.fr/item/PDMA_2015_8_a53/ %G ru %F PDMA_2015_8_a53
I. A. Bogachkova; O. S. Zaikin; S. E. Kochemazov; I. V. Otpuschennikov; A. A. Semenov. Application of algorithms solving SAT problem to cryptanalysis of hash functions of MD family. Prikladnaya Diskretnaya Matematika. Supplement, no. 8 (2015), pp. 139-142. http://geodesic.mathdoc.fr/item/PDMA_2015_8_a53/
[1] Merkle R. A., “Certified digital signature”, LNCS, 435, 1990, 218–238 | MR
[2] Damgard I. A., “A design principle for hash functions”, LNCS, 435, 1990, 416–427 | MR | Zbl
[3] Rivest R. L., “The MD4 Message Digest Algorithm”, LNCS, 537, 1991, 303–311 | Zbl
[4] Wang X., Lai X., Feng D., et. al., “Cryptanalysis of the hash functions MD4 and RIPEMD”, LNCS, 3494, 2005, 1–18 | MR | Zbl
[5] Wang X., Yu H., “How to break MD5 and other hash functions”, LNCS, 3494, 2005, 19–35 | MR | Zbl
[6] Biham E., Shamir A., “Differential cryptanalysis of DES-like cryptosystems”, J. Cryptology, 4:1 (1991), 3–72 | DOI | MR | Zbl
[7] Mironov I., Zhang L., “Applications of SAT solvers to cryptanalysis of hash functions”, LNCS, 4121, 2006, 102–115 | MR | Zbl
[8] Biere A., Heule V., van Maaren H, Walsh T., Handbook of Satisfiability, IOS Press, Amsterdam, 2009 | Zbl
[9] Bogachkova I. A., Zaikin O. S., Kochemazov S. E., Otpuschennikov I. V., Semënov A. A., “Zadachi poiska kollizii dlya kriptograficheskikh khesh-funktsii semeistva MD kak varianty zadachi o bulevoi vypolnimosti”, Vychislitelnye metody i programmirovanie, 16 (2015), 61–77
[10] Otpuschennikov I. V., Semënov A. A., “Tekhnologiya translyatsii kombinatornykh problem v bulevy uravneniya”, Prikladnaya diskretnaya matematika, 2011, no. 1, 96–115
[11] De D., Kumarasubramanian A., Venkatesan R., “Inversion attacks on secure hash functions using SAT solvers”, LNCS, 4501, 2007, 377–382 | Zbl
[12] Dobbertin H., “The first two rounds of MD4 are not One-Way”, Proc. 5th Intern. Workshop Fast Software Encryption, Springer Verlag, London, UK, 1998, 284–292 | DOI
[13] Nadel A., Ryvchin V., “Efficient SAT solving under assumptions”, LNCS, 7317, 2012, 242–255 | Zbl