References
Standardization Administration of the People’s Republic of China. Information security techniques — SM3 cryptographic hash algorithm. GB/T 32905-2016. http://www.sac.gov.cn/gzfw/ggcx/gjbzgg/201614/
Zou J, Wu W, Wu S, et al. Preimage attacks on stepreduced SM3 hash function. In: Proceedings of the 14th International Conference on Information Security and Cryptology. Berlin: Springer-Verlag, 2011. 375–390
Wang G, Shen Y. Preimage and pseudo-collision attacks on step-reduced SM3 hash function. Inf Proc Lett, 2013, 113: 301–306
Bai D, Yu H, Wang G, et al. Improved boomerang attacks on SM3. In: Proceedings of the 18th Australasian Conference on Information Security and Privacy. Berlin: Springer-Verlag, 2013. 251–266
Bai D, Yu H, Wang G, et al. Improved boomerang attacks on round-reduced SM3 and keyed permutation of BLAKE-256. IET Inf Secur, 2014, 9: 167–178
Knellwolf S, Khovratovich D. New preimage attacks against reduced SHA-1. In: Proceedings of the 32nd Annual Cryptology Conference. Berlin: Springer-Verlag, 2012. 367–383
Yu H, Chen J, Wang X. The boomerang attacks on the round-reduced Skein-512. In: Proceedings of the 19th International Conference on Selected Areas in Cryptography. Berlin: Springer-Verlag, 2012. 287–303
Acknowledgements
This work was supported by National Basic Research Program of China (973 Program) (Grant No. 2013CB834205) and National Natural Science Foundation of China (Grant No. 61373142).
Author information
Authors and Affiliations
Corresponding author
Additional information
The authors declare that they have no conflict of interest.
Rights and permissions
About this article
Cite this article
Shen, Y., Bai, D. & Yu, H. Improved cryptanalysis of step-reduced SM3. Sci. China Inf. Sci. 61, 038105 (2018). https://doi.org/10.1007/s11432-017-9119-6
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-017-9119-6