@inproceedings{a727dce01b544ad99bfd2b6030a1c5b7,
title = "Improved boomerang attacks on SM3",
abstract = "The cryptographic hash function SM3 is designed by X. Wang et al. and published by Chinese Commercial Cryptography Administration Office for the use of electronic certification service system in China. It is based on the Merkle-Damg{\aa}rd design and is very similar to SHA-2 but includes some additional strengthening features. In this paper, we apply the boomerang attack to SM3 compression function, and present such distinguishers on up to 34/35/36/37 steps out of 64 steps, with time complexities 231.4, 233.6, 273.4 and 293 compression function calls respectively. Especially, we are able to obtain the examples of the distinguishers on 34-step and 35-step on a PC due to their practical complexities. In addition, incompatible problems in the recent boomerang attack are pointed out.",
keywords = "SM3, boomerang attack, cryptanalysis, hash function",
author = "Dongxia Bai and Hongbo Yu and Gaoli Wang and Xiaoyun Wang",
year = "2013",
doi = "10.1007/978-3-642-39059-3\_17",
language = "英语",
isbn = "9783642390586",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "251--266",
booktitle = "Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Proceedings",
address = "德国",
note = "18th Australasian Conference on Information Security and Privacy, ACISP 2013 ; Conference date: 01-07-2013 Through 03-07-2013",
}