Please use this identifier to cite or link to this item:
https://research.matf.bg.ac.rs/handle/123456789/506
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jovanović, Dejan | en_US |
dc.contributor.author | Janičić, Predrag | en_US |
dc.date.accessioned | 2022-08-13T10:14:41Z | - |
dc.date.available | 2022-08-13T10:14:41Z | - |
dc.date.issued | 2005-01-01 | - |
dc.identifier.isbn | 3540290516 | - |
dc.identifier.issn | 03029743 | en |
dc.identifier.uri | https://research.matf.bg.ac.rs/handle/123456789/506 | - |
dc.description.abstract | In this paper we report on a novel approach for uniform encoding of hash functions (but also other cryptographic functions) into propositional logic formulae, and reducing cryptanalysis problems to the satisfiability problem. The approach is general, elegant, and does not require any human expertise on the construction of a specific cryptographic function. By using this approach, we developed a technique for generating hard and satisfiable propositional formulae and hard and unsatisfiable propositional formulae. In addition, one can finely tune the hardness of generated formulae. This can be very important for different applications, including testing (complete or incomplete) SAT solvers. The uniform logical analysis of cryptographic functions can be used for comparison between different functions and can expose weaknesses of some of them (as shown for MD4 in comparison with MD5). © Springer-Verlag Berlin Heidelberg 2005. | en |
dc.relation.ispartof | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | en_US |
dc.title | Logical analysis of hash functions | en_US |
dc.type | Conference Paper | en_US |
dc.relation.publication | International Workshop on Frontiers of Combining Systems FroCoS 2005 | en_US |
dc.identifier.doi | 10.1007/11559306_11 | - |
dc.identifier.scopus | 2-s2.0-33646195234 | - |
dc.identifier.url | https://api.elsevier.com/content/abstract/scopus_id/33646195234 | - |
dc.contributor.affiliation | Informatics and Computer Science | en_US |
dc.relation.firstpage | 200 | en_US |
dc.relation.lastpage | 215 | en_US |
dc.relation.volume | 3717 LNAI | en_US |
item.fulltext | No Fulltext | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
item.grantfulltext | none | - |
item.openairetype | Conference Paper | - |
crisitem.author.dept | Informatics and Computer Science | - |
crisitem.author.orcid | 0000-0001-8922-4948 | - |
Appears in Collections: | Research outputs |
SCOPUSTM
Citations
20
checked on Dec 20, 2024
Page view(s)
20
checked on Dec 25, 2024
Google ScholarTM
Check
Altmetric
Altmetric
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.