-
Notifications
You must be signed in to change notification settings - Fork 1
/
thesis.bib
305 lines (278 loc) · 10.6 KB
/
thesis.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
@inproceedings{Cry01,
author = {Christophe De Cannière and Christian Rechberger},
title = {Finding SHA-1 Characteristics: General Results and Applications},
pages = {1-20},
url = {http://dx.doi.org/10.1007/11935230_1},
editor = {Xuejia Lai and Kefei Chen},
booktitle = {ASIACRYPT},
publisher = {Springer},
series = {LNCS},
volume = {4284},
year = {2006},
isbn = {3-540-49475-8},
abstract = {The most efficient collision attacks on members of the SHA family presented so far all use complex characteristics which were manually constructed by Wang et al. In this report, we describe a method to search for characteristics in an automatic way. This is particularly useful for multi-block attacks, and as a proof of concept, we give a two-block collision for 64-step SHA-1 based on a new characteristic. The highest number of steps for which a SHA-1 collision was published so far was 58. We also give a unified view on the expected work factor of a collision search and the needed degrees of freedom for the search, which facilitates optimization.},
}
@phdthesis{Cry02,
author = {Martin Schl\"{a}ffer},
title = {Cryptanalysis of AES-Based Hash Functions},
school = {Institute for Applied Information Processing and Communications},
year = {2011}
}
@inproceedings{Cry03,
author = {Mendel, Florian and Nad, Tomislav and Schl\"{a}ffer, Martin},
title = {Finding SHA-2 Characteristics: Searching Through a Minefield of Contradictions},
booktitle = {Proceedings of the 17th International Conference on The Theory and Application of Cryptology and Information Security},
series = {ASIACRYPT'11},
year = {2011},
isbn = {978-3-642-25384-3},
location = {Seoul, South Korea},
pages = {288--307},
numpages = {20},
url = {http://dx.doi.org/10.1007/978-3-642-25385-0_16},
doi = {10.1007/978-3-642-25385-0_16},
acmid = {2184043},
publisher = {Springer-Verlag},
address = {Berlin, Heidelberg},
keywords = {SHA-2, collision attack, differential characteristic, generalized conditions, hash functions},
}
@incollection{Cry04,
year = {2012},
isbn = {978-3-642-33259-3},
booktitle = {Computer Information Systems and Industrial Management},
volume = {7564},
series = {Lecture Notes in Computer Science},
editor = {Cortesi, Agostino and Chaki, Nabendu and Saeed, Khalid and Wierzchoń, Sławomir},
doi = {10.1007/978-3-642-33260-9_4},
title = {Security Margin Evaluation of SHA-3 Contest Finalists through SAT-Based Attacks},
url = {http://dx.doi.org/10.1007/978-3-642-33260-9_4},
publisher = {Springer Berlin Heidelberg},
keywords = {Cryptographic hash algorithm; SHA-3 competition; algebraic cryptanalysis; logical cryptanalysis; SATisfiability solvers},
author = {Homsirikamol, Ekawat and Morawiecki, Paweł and Rogawski, Marcin and Srebrny, Marian},
pages = {56-67}
}
@inproceedings{Cry05,
author = {Fabio Massacci},
title = {Using Walk-SAT and Rel-SAT for cryptographic key search},
booktitle = {In Proceedings of the International Joint Conference on Artifical Intelligence},
year = {1999},
pages = {290--295}
}
@inproceedings{Cry05b,
author = {Fabio Massacci},
title = {Logical Cryptanalysis as a SAT Problem},
journal = {Journal of Automated Reasoning},
year = {2000},
pages = {165--203}
}
@incollection{Cry06,
year = {2009},
isbn = {978-3-642-02776-5},
booktitle = {Theory and Applications of Satisfiability Testing - SAT 2009},
volume = {5584},
series = {Lecture Notes in Computer Science},
editor = {Kullmann, Oliver},
doi = {10.1007/978-3-642-02777-2_24},
title = {Extending SAT Solvers to Cryptographic Problems},
url = {http://dx.doi.org/10.1007/978-3-642-02777-2_24},
publisher = {Springer Berlin Heidelberg},
author = {Soos, Mate and Nohl, Karsten and Castelluccia, Claude},
pages = {244-257}
}
@inproceedings{Cry07,
author = {Florian Mendel and Tomislav Nad and Martin Schl\"{a}ffer},
title = {Finding SHA-2 Characteristics: Searching Through a Minefield of Contradictions},
booktitle = {ASIACRYPT},
year = {2011},
editor = {Dong Hoon Lee and Xiaoyun Wang},
volume = {7073},
series = {LNCS},
pages = {288 - 307},
publisher = {Springer},
}
@inproceedings{Cry08,
author = {Florian Mendel and Tomislav Nad and Martin Schl\"{a}ffer},
title = {Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128},
booktitle = {Fast Software Encryption},
year = {2012},
editor = {Anne Canteau},
volume = {7549},
series = {LNCS},
pages = {226 - 243},
publisher = {Springer},
}
@incollection{Cry10,
year = {2005},
isbn = {978-3-540-25910-7},
booktitle = {Advances in Cryptology – EUROCRYPT 2005},
volume = {3494},
series = {Lecture Notes in Computer Science},
editor = {Cramer, Ronald},
doi = {10.1007/11426639_2},
title = {How to Break MD5 and Other Hash Functions},
url = {http://dx.doi.org/10.1007/11426639_2},
publisher = {Springer Berlin Heidelberg},
author = {Wang, Xiaoyun and Yu, Hongbo},
pages = {19-35}
}
@masterthesis{Cry15,
author = {Martin Schl\"{a}ffer},
title = {Cryptanalysis of MD4},
year = {2006}
}
@inproceedings{Cry16,
author = {Maria Eichlseder and Florian Mendel and Tomislav Nad and Vincent Rijmen and Martin Schl\"{a}ffer},
title = {Linear Propagation in Efficient Guess-and-Determine Attacks},
booktitle = {Preproceedings of the International Workshop on Coding and Cryptography},
year = {2013},
editor = {Lilya Budaghyan, Tor Helleseth, Matthew G. Parker},
pages = {193 - 202}
}
@inproceedings{Sat01,
title = {The complexity of theorem-proving procedures},
author = {Cook, Stephen A},
booktitle = {Proceedings of the third annual ACM symposium on Theory of computing},
pages = {151--158},
year = {1971},
organization = {ACM}
}
@article{Sat02,
title = {Universal sequential search problems},
author = {Levin, Leonid A},
journal = {Problemy Peredachi Informatsii},
volume = {9},
number = {3},
pages = {115--116},
year = {1973},
publisher = {Russian Academy of Sciences, Branch of Informatics, Computer Equipment and Automatization}
}
@incollection{Sat03,
year = {2005},
isbn = {978-3-540-29051-3},
booktitle = {Frontiers of Combining Systems},
volume = {3717},
series = {Lecture Notes in Computer Science},
editor = {Gramlich, Bernhard},
doi = {10.1007/11559306_11},
title = {Logical Analysis of Hash Functions},
url = {http://dx.doi.org/10.1007/11559306_11},
publisher = {Springer Berlin Heidelberg},
author = {Jovanović, Dejan and Janičić, Predrag},
pages = {200-215}
}
@article{Sat05,
author = {Davis, Martin and Putnam, Hilary},
title = {A Computing Procedure for Quantification Theory},
journal = {J. ACM},
issue_date = {July 1960},
volume = {7},
number = {3},
month = jul,
year = {1960},
issn = {0004-5411},
pages = {201--215},
numpages = {15},
url = {http://doi.acm.org/10.1145/321033.321034},
doi = {10.1145/321033.321034},
acmid = {321034},
publisher = {ACM},
address = {New York, NY, USA},
}
@incollection{Sat06,
year = {2007},
isbn = {978-3-540-74564-8},
booktitle = {KI 2007: Advances in Artificial Intelligence},
volume = {4667},
series = {Lecture Notes in Computer Science},
editor = {Hertzberg, Joachim and Beetz, Michael and Englert, Roman},
doi = {10.1007/978-3-540-74565-5_2},
title = {Early History and Perspectives of Automated Deduction},
url = {http://dx.doi.org/10.1007/978-3-540-74565-5_2},
publisher = {Springer Berlin Heidelberg},
author = {Bibel, Wolfgang},
pages = {2-18}
}
@article{Sat07,
title = {A deterministic $(2-2/(k+1))^n$ algorithm for $k$-SAT based on local search},
journal = {Theoretical Computer Science},
volume = {289},
number = {1},
pages = {69 - 83},
year = {2002},
issn = {0304-3975},
doi = {http://dx.doi.org/10.1016/S0304-3975(01)00174-8},
url = {http://www.sciencedirect.com/science/article/pii/S0304397501001748},
author = {Evgeny Dantsin and Andreas Goerdt and Edward A Hirsch and Ravi Kannan and Jon Kleinberg and Christos Papadimitriou and Prabhakar Raghavan and Uwe Schöning}
}
@incollection{Sat08,
year = {1999},
isbn = {978-1-4419-4813-7},
booktitle = {Handbook of Combinatorial Optimization},
editor = {Du, Ding-Zhu and Pardalos, PanosM.},
doi = {10.1007/978-1-4757-3023-4_7},
title = {Algorithms for the Satisfiability (SAT) Problem},
url = {http://dx.doi.org/10.1007/978-1-4757-3023-4_7},
publisher = {Springer US},
author = {Gu, Jun and Purdom, PaulW. and Franco, John and Wah, BenjaminW.},
pages = {379-572},
language = {English}
}
@techreport{Sat09,
booktitle = {DIMACS Challenge},
howpublished = {ftp://dimacs.rutgers.edu/pub/challenge/satisfiability/doc/},
keywords = {satisfiability, standards},
priority = {0},
title = {{Satisfiability Suggested Format}},
url = {ftp://dimacs.rutgers.edu/pub/challenge/satisfiability/doc/},
year = {1993}
}
@misc{Sat10,
author = {Gaetan Leurent},
title = {Construction of Differential Characteristics in ARX Designs -- Application to Skein},
howpublished = {Cryptology ePrint Archive, Report 2012/668},
year = {2012},
note = {\url{http://eprint.iacr.org/}},
}
@article{Sat11,
title = {Towards Finding Optimal Differential Characteristics for ARX: Application to Salsa20},
author = {Mouha, Nicky and Preneel, Bart},
year = {2013},
note = {\url{http://eprint.iacr.org/}},
}
@book{Sat20,
author = {Biere, A. and Heule, M. and van Maaren, H. and Walsh, T.},
title = {Handbook of Satisfiability: Volume 185 Frontiers in Artificial Intelligence and Applications},
year = {2009},
isbn = {1586039296, 9781586039295},
publisher = {IOS Press},
address = {Amsterdam, The Netherlands, The Netherlands}
}
@online{Sat21,
author = {SATlive},
title = {The international SAT Competitions web page},
year = 2013,
url = {http://satcompetition.org/},
urldate = {2014-02-27}
}
@incollection{Sat22,
year = {2013},
isbn = {978-3-642-39070-8},
booktitle = {Theory and Applications of Satisfiability Testing – SAT 2013},
volume = {7962},
series = {Lecture Notes in Computer Science},
editor = {Järvisalo, Matti and Van Gelder, Allen},
doi = {10.1007/978-3-642-39071-5_3},
title = {There Are No CNF Problems},
url = {http://dx.doi.org/10.1007/978-3-642-39071-5_3},
publisher = {Springer Berlin Heidelberg},
author = {Stuckey, PeterJ.},
pages = {19-21}
}
@inproceedings{Sat30,
title = {A single-instance incremental SAT formulation of proof-and counterexample-based abstraction},
author = {Een, Niklas and Mishchenko, Alan and Amla, Nina},
url = {http://arxiv.org/pdf/1008.2021.pdf},
booktitle = {Formal Methods in Computer-Aided Design (FMCAD), 2010},
pages = {181--188},
year = {2010},
organization = {IEEE}
}