Inverting cryptographic hash functions via Cube-and-Conquer

O Zaikin - Journal of Artificial Intelligence Research, 2024 - jair.org
MD4 and MD5 are fundamental cryptographic hash functions proposed in the early 1990s.
MD4 consists of 48 steps and produces a 128-bit hash given a message of arbitrary finite …

Cdcl (crypto) sat solvers for cryptanalysis

S Nejati, V Ganesh - arXiv preprint arXiv:2005.13415, 2020 - arxiv.org
Over the last two decades, we have seen a dramatic improvement in the efficiency of conflict-
driven clause-learning Boolean satisfiability (CDCL SAT) solvers on industrial problems …

Algebraic fault analysis of SHA-256 compression function and its application

K Nakamura, K Hori, S Hirose - Information, 2021 - mdpi.com
Cryptographic hash functions play an essential role in various aspects of cryptography, such
as message authentication codes, pseudorandom number generation, digital signatures …

Empirical Study on SAT-Encodings of the At-Most-One Constraint

VH Nguyen, VQ Nguyen, K Kim… - The 9th International …, 2020 - dl.acm.org
Propositional satisfiability solving (SAT) has been one of the most successful automated
reasoning methods in the last decade in computer science by solving a wide range of both …

Inverting Step-Reduced SHA-1 and MD5 by Parameterized SAT Solvers

O Zaikin - 30th International Conference on Principles and …, 2024 - drops.dagstuhl.de
MD5 and SHA-1 are fundamental cryptographic hash functions proposed in 1990s. Given a
message of arbitrary finite size, MD5 produces a 128-bit hash in 64 steps, while SHA-1 …

Lightweight protection of cryptographic hardware accelerators against differential fault analysis

A Lasheras, R Canal, E Rodríguez… - 2020 IEEE 26th …, 2020 - ieeexplore.ieee.org
Hardware acceleration circuits for cryptographic algorithms are largely deployed in a wide
range of products. The HW implementations of such algorithms often suffer from a number of …

Algebraic and Logic Solving Methods for Cryptanalysis

J Horáček - 2020 - opus4.kobv.de
Algebraic solving of polynomial systems and satisfiability of propositional logic formulas are
not two completely separate research areas, as it may appear at first sight. In fact, many …

[PDF][PDF] Unit Propagation with Stable Watches (Short Paper)

M Iser, T Balyo - 27th International Conference on Principles and …, 2021 - drops.dagstuhl.de
Unit propagation is the hottest path in CDCL SAT solvers, therefore the related data-
structures, algorithms and implementation details are well studied and highly optimized …

Cdcl (crypto) and machine learning based sat solvers for cryptanalysis

S Nejati - 2020 - uwspace.uwaterloo.ca
Over the last two decades, we have seen a dramatic improvement in the efficiency of conflict-
driven clause-learning Boolean satisfiability (CDCL SAT) solvers over industrial problems …

The Insecurity of SHA2 under the Differential Fault Characteristic of Boolean Functions

W Cao, H Chen, H Shi, H Li, J Wang - Cryptology ePrint Archive, 2024 - eprint.iacr.org
SHA2 is widely used in various traditional public key ryptosystems, post-quantum
cryptography, personal identification, and network communication protocols. Therefore …