{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T04:25:19Z","timestamp":1769315119519,"version":"3.49.0"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,2,13]],"date-time":"2019-02-13T00:00:00Z","timestamp":1550016000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1007\/s00145-019-09313-3","type":"journal-article","created":{"date-parts":[[2019,2,13]],"date-time":"2019-02-13T16:55:22Z","timestamp":1550076922000},"page":"228-270","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["Practical Collision Attacks against Round-Reduced SHA-3"],"prefix":"10.1007","volume":"33","author":[{"given":"Jian","family":"Guo","sequence":"first","affiliation":[]},{"given":"Guohong","family":"Liao","sequence":"additional","affiliation":[]},{"given":"Guozhen","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Meicheng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Kexin","family":"Qiao","sequence":"additional","affiliation":[]},{"given":"Ling","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,13]]},"reference":[{"key":"9313_CR1","unstructured":"J.-P. Aumasson, W. Meier. Zero-sum distinguishers for reduced Keccak-f and for the core functions of Luffa and Hamsi. rump session of Cryptographic Hardware and Embedded Systems-CHES, 2009 (2009)"},{"key":"9313_CR2","unstructured":"G. Bertoni, J. Daemen, M. Peeters, G. Van Assche. Keccak crunchy crypto collision and pre-image contest. http:\/\/keccak.noekeon.org\/crunchy_contest.html"},{"key":"9313_CR3","unstructured":"G. Bertoni, J. Daemen, M. Peeters, G. Van Assche. Cryptographic sponge functions. Submission to NIST (Round 3) (2011). http:\/\/sponge.noekeon.org\/CSF-0.1.pdf"},{"key":"9313_CR4","unstructured":"G. Bertoni, J. Daemen, M. Peeters, G. Van Assche. The Keccak reference. http:\/\/keccak.noekeon.org , January (2011). Version 3.0"},{"key":"9313_CR5","unstructured":"G. Bertoni, J. Daemen, M. Peeters, G. Van Assche. KeccakTools. http:\/\/keccak.noekeon.org\/ , (2015)"},{"key":"9313_CR6","doi-asserted-by":"crossref","unstructured":"A. Canteaut, editor. in Fast Software Encryption\u201419th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers, volume 7549 of Lecture Notes in Computer Science ( Springer, 2012)","DOI":"10.1007\/978-3-642-34047-5"},{"key":"9313_CR7","doi-asserted-by":"crossref","unstructured":"P.-L. Cayrel, G. Hoffmann, M. Schneider. GPU implementation of the Keccak hash function family. in International Conference on Information Security and Assurance, (Springer, 2011), pp. 33\u201342","DOI":"10.1007\/978-3-642-23141-4_4"},{"key":"9313_CR8","unstructured":"J. Daemen. Cipher and Hash Function Design Strategies Based on Linear and Differential Cryptanalysis. Ph.D. thesis, Doctoral Dissertation, March 1995, KU Leuven (1995)"},{"key":"9313_CR9","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/978-3-642-34047-5_24","volume-title":"Fast Software Encryption","author":"Joan Daemen","year":"2012","unstructured":"J. Daemen, G. V. Assche. Differential propagation analysis of Keccak. in Canteaut [6], pp. 422\u2013441"},{"key":"9313_CR10","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/978-3-642-34047-5_25","volume-title":"Fast Software Encryption","author":"Itai Dinur","year":"2012","unstructured":"I. Dinur, O. Dunkelman, A. Shamir. New attacks on Keccak-224 and Keccak-256. in Canteaut [6], pp. 442\u2013461"},{"key":"9313_CR11","doi-asserted-by":"crossref","unstructured":"I. Dinur, O. Dunkelman, A. Shamir. Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials. in S. Moriai, editor, Fast Software Encryption\u201420th International Workshop, FSE 2013, Singapore, March 11\u201313, 2013. Revised Selected Papers, volume 8424 of Lecture Notes in Computer Science, (Springer, 2013), pp. 219\u2013240","DOI":"10.1007\/978-3-662-43933-3_12"},{"issue":"2","key":"9313_CR12","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s00145-012-9142-5","volume":"27","author":"I Dinur","year":"2014","unstructured":"I. Dinur, O. Dunkelman, A. Shamir. Improved practical attacks on round-reduced Keccak. J. Cryptol.27(2), 183\u2013209 (2014)","journal-title":"J. Cryptol."},{"key":"9313_CR13","doi-asserted-by":"crossref","unstructured":"I. Dinur, P. Morawiecki, J. Pieprzyk, M. Srebrny, M. Straus. Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function. in E. Oswald, M. Fischlin, editors, Advances in Cryptology\u2014EUROCRYPT 2015, Sofia, Bulgaria, April 26\u201330, 2015, Proceedings, Part I, volume 9056 of LNCS, (Springer, 2015), pp. 733\u2013761","DOI":"10.1007\/978-3-662-46800-5_28"},{"key":"9313_CR14","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1007\/978-3-642-34047-5_23","volume-title":"Fast Software Encryption","author":"Alexandre Duc","year":"2012","unstructured":"A. Duc, J. Guo, T. Peyrin, L. Wei. Unaligned rebound attack: application to Keccak. in Canteaut [6], pp. 402\u2013421"},{"issue":"1","key":"9313_CR15","doi-asserted-by":"crossref","first-page":"33","DOI":"10.46586\/tosc.v2016.i1.33-56","volume":"2016","author":"J Guo","year":"2016","unstructured":"J. Guo, J. Jean, I. Nikolic, K. Qiao, Y. Sasaki, S. M. Sim. Invariant subspace attack against Midori64 and the resistance criteria for S-box designs. IACR Trans. Symmetric Cryptol.2016(1), 33\u201356 (2016)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"9313_CR16","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/978-3-662-53887-6_9","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2016","author":"Jian Guo","year":"2016","unstructured":"J. Guo, M. Liu, L. Song. Linear structures: applications to cryptanalysis of round-reduced Keccak. in J. H. Cheon, T. Takagi, editors, Advances in Cryptology\u2014ASIACRYPT 2016, Hanoi, Vietnam, December 4\u20138, 2016, Proceedings, Part I, volume 10031 of LNCS, (2016), pp. 249\u2013274"},{"key":"9313_CR17","doi-asserted-by":"crossref","unstructured":"J. Jean, I. Nikolic. Internal differential boomerangs: practical analysis of the round-reduced Keccak-f permutation. In G. Leander, editor, Fast Software Encryption\u2014FSE 2015, Istanbul, Turkey, March 8\u201311, 2015, Revised Selected Papers, volume 9054 of LNCS, (Springer, 2015), pp. 537\u2013556","DOI":"10.1007\/978-3-662-48116-5_26"},{"key":"9313_CR18","doi-asserted-by":"crossref","unstructured":"S. K\u00f6lbl, F. Mendel, T. Nad, M. Schl\u00e4ffer. Differential cryptanalysis of Keccak variants. in M. Stam, editor, Cryptography and Coding\u201414th IMA International Conference, IMACC 2013, Oxford, UK, December 17\u201319, 2013. Proceedings, volume 8308 of Lecture Notes in Computer Science, (Springer, 2013), pp. 141\u2013157","DOI":"10.1007\/978-3-642-45239-0_9"},{"issue":"1","key":"9313_CR19","doi-asserted-by":"crossref","first-page":"329","DOI":"10.46586\/tosc.v2017.i1.329-357","volume":"2017","author":"S Mella","year":"2017","unstructured":"S. Mella, J. Daemen, G. V. Assche. New techniques for trail bounds and application to differential trails in Keccak. IACR Trans. Symmetric Cryptol.2017(1), 329\u2013357 (2017)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"9313_CR20","doi-asserted-by":"crossref","unstructured":"G. S. Murthy. Optimal loop unrolling for GPGPU programs. Ph.D. thesis, The Ohio State University (2009)","DOI":"10.1109\/IPDPS.2010.5470423"},{"key":"9313_CR21","doi-asserted-by":"crossref","unstructured":"M. Naya-Plasencia, A. R\u00f6ck, W. Meier. Practical analysis of reduced-round Keccak. in D. J. Bernstein, S. Chatterjee, editors, Progress in Cryptology\u2014INDOCRYPT 2011\u201412th International Conference on Cryptology in India, Chennai, India, December 11\u201314, 2011. Proceedings, volume 7107 of Lecture Notes in Computer Science, (Springer, 2011), pp. 236\u2013254","DOI":"10.1007\/978-3-642-25578-6_18"},{"key":"9313_CR22","unstructured":"NIST. SHA-3 Competition. http:\/\/csrc.nist.gov\/groups\/ST\/hash\/sha-3\/index.html , 2007\u20132012"},{"key":"9313_CR23","unstructured":"C. Nvidia. CUDA C programming guide. Nvidia Corporation, 120(18) (2011)"},{"key":"9313_CR24","unstructured":"K. Qiao, L. Song, M. Liu, J. Guo. New collision attacks on round-reduced Keccak. in J. Coron, J. B. Nielsen, editors, Advances in Cryptology\u2014EUROCRYPT 2017\u201436th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30\u2013May 4, 2017, Proceedings, Part III, volume 10212 of Lecture Notes in Computer Science, (2017), pp. 216\u2013243"},{"key":"9313_CR25","unstructured":"G. Sevestre. Implementation of Keccak hash function in tree hashing mode on Nvidia GPU (2010)"},{"key":"9313_CR26","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1007\/978-3-319-63715-0_15","volume-title":"Advances in Cryptology \u2013 CRYPTO 2017","author":"Ling Song","year":"2017","unstructured":"L. Song, G. Liao, J. Guo. Non-full sbox linearization: applications to collision attacks on round-reduced Keccak. in J. Katz, H. Shacham, editors, Advances in Cryptology\u2014CRYPTO 2017\u201437th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20\u201324, 2017, Proceedings, Part II, volume 10402 of Lecture Notes in Computer Science, (Springer, 2017), pp. 428\u2013451"},{"key":"9313_CR27","unstructured":"The U.S. National Institute of Standards and Technology. SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions . Federal Information Processing Standard, FIPS\u00a0202, 5th August (2015)"},{"key":"9313_CR28","unstructured":"V. Volkov. Better performance at lower occupancy. in Proceedings of the GPU technology conference, GTC, volume\u00a010. San Jose, CA (2010)"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00145-019-09313-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-019-09313-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-019-09313-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,27]],"date-time":"2020-11-27T17:59:59Z","timestamp":1606499999000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00145-019-09313-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,13]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,1]]}},"alternative-id":["9313"],"URL":"https:\/\/doi.org\/10.1007\/s00145-019-09313-3","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,2,13]]},"assertion":[{"value":"30 July 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 January 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 February 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}