{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:04Z","timestamp":1750221244526,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,7,15]],"date-time":"2018-07-15T00:00:00Z","timestamp":1531612800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Temasek Laboratories, NTU"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,7,15]]},"DOI":"10.1145\/3229631.3239366","type":"proceedings-article","created":{"date-parts":[[2019,1,14]],"date-time":"2019-01-14T13:15:25Z","timestamp":1547471725000},"page":"167-172","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Crack me if you can: hardware acceleration bridging the gap between practical and theoretical cryptanalysis?"],"prefix":"10.1145","author":[{"given":"Mustafa","family":"Khairallah","sequence":"first","affiliation":[{"name":"NTU, Singapore"}]},{"given":"Zakaria","family":"Najm","sequence":"additional","affiliation":[{"name":"NTU, Singapore"}]},{"given":"Anupam","family":"Chattopadhyay","sequence":"additional","affiliation":[{"name":"NTU, Singapore"}]},{"given":"Thomas","family":"Peyrin","sequence":"additional","affiliation":[{"name":"NTU, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2018,7,15]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Elaine Barker. 2016. Recommendation for key management part 1: General. NIST special publication (2016).  Elaine Barker. 2016. Recommendation for key management part 1: General. NIST special publication (2016).","key":"e_1_3_2_1_1_1","DOI":"10.6028\/NIST.SP.800-57pt1r4"},{"unstructured":"Sam Biddle. 2017. NYU ACCIDENTALLY EXPOSED MILITARY CODE-BREAKING COMPUTER PROJECT TO ENTIRE INTERNET. URL https:\/\/theintercept.com\/2017\/05\/11\/nyu-accidentally-exposed-military-code-braking-computer-project-to-entire-internet\/ (2017).  Sam Biddle. 2017. NYU ACCIDENTALLY EXPOSED MILITARY CODE-BREAKING COMPUTER PROJECT TO ENTIRE INTERNET. URL https:\/\/theintercept.com\/2017\/05\/11\/nyu-accidentally-exposed-military-code-braking-computer-project-to-entire-internet\/ (2017).","key":"e_1_3_2_1_2_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1007\/978-3-540-28628-8_18"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1007\/s00145-014-9179-8"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1007\/11426639_3"},{"volume-title":"Proceedings of DIMACS workshop on DNA computing","year":"1995","author":"Boneh Dan","key":"e_1_3_2_1_6_1"},{"unstructured":"Frank Carter. 2008. The Turing Bombe. Bletchley Park Trust.  Frank Carter. 2008. The Turing Bombe. Bletchley Park Trust.","key":"e_1_3_2_1_7_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.5555\/646763.706337"},{"unstructured":"Rafael Chen and Eli Biham. 2011. New Techniques for Cryptanalysis of Cryptographic Hash Functions. Ph.D. Dissertation. Computer Science Department Technion.  Rafael Chen and Eli Biham. 2011. New Techniques for Cryptanalysis of Cryptographic Hash Functions. Ph.D. Dissertation. Computer Science Department Technion.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","first-page":"474","article-title":"Notes on the Wang et al. 263 SHA-1 Differential Path","volume":"2007","author":"Martin Cochran","year":"2007","journal-title":"IACR Cryptology ePrint Archive"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.5555\/1784881.1784885"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1007\/11935230_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1109\/C-M.1977.217750"},{"unstructured":"John Gilmore. 1998. Cracking DES: Secrets of Encryption Research Wiretap Politics & Chip Design.   John Gilmore. 1998. Cracking DES: Secrets of Encryption Research Wiretap Politics & Chip Design.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","first-page":"413","article-title":"Collisions for 72-step and 73-step SHA-1: Improvements in the Method of Characteristics","volume":"2010","author":"Grechnikov Evgeny A","year":"2010","journal-title":"IACR Cryptology ePrint Archive"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1109\/TC.2008.80"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1109\/DSD.2015.78"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1109\/TIT.1980.1056220"},{"doi-asserted-by":"crossref","unstructured":"Antoine Joux. 2009. Algorithmic cryptanalysis. CRC Press.   Antoine Joux. 2009. Algorithmic cryptanalysis. CRC Press.","key":"e_1_3_2_1_19_1","DOI":"10.1201\/9781420070033"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.5555\/1777777.1777798"},{"key":"e_1_3_2_1_21_1","first-page":"266","article-title":"A Matching Lower Bound on the Minimum Weight of SHA-1 Expansion Code","volume":"2005","author":"Jutla Charanjit S","year":"2005","journal-title":"IACR Cryptology ePrint Archive"},{"unstructured":"Pierre Karpman. 2016. Analyse de primitives sym\u00e9triques. Ph.D. Dissertation. Universit\u00e9 Paris-Saclay.  Pierre Karpman. 2016. Analyse de primitives sym\u00e9triques. Ph.D. Dissertation. Universit\u00e9 Paris-Saclay.","key":"e_1_3_2_1_22_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1007\/978-3-662-47989-6_30"},{"unstructured":"J Keller and B Seitz. 2012. A Hardware-Based Attack on the A5\/1 Stream Cipher (2001). URL http:\/\/pv.fernuni-hagen.de\/docs\/apc2001-final.pdf. Accessed April (2012).  J Keller and B Seitz. 2012. A Hardware-Based Attack on the A5\/1 Stream Cipher (2001). URL http:\/\/pv.fernuni-hagen.de\/docs\/apc2001-final.pdf. Accessed April (2012).","key":"e_1_3_2_1_24_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1007\/11894063_9"},{"key":"e_1_3_2_1_26_1","volume-title":"Science Advances","volume":"3","author":"Lekitsch Bjoern","year":"2017"},{"unstructured":"St\u00e9phane Manuel. 2008. Classification and generation of disturbance vectors for collision attacks against SHA-1. (2008).  St\u00e9phane Manuel. 2008. Classification and generation of disturbance vectors for collision attacks against SHA-1. (2008).","key":"e_1_3_2_1_27_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1007\/s10623-010-9458-9"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1007\/978-3-540-71039-4_2"},{"unstructured":"Nick Marinoff. 2018. Samsung Is Building ASIC Chips for Halong Mining. URL https:\/\/bitcoinmagazine.com\/articles\/samsung-building-asic-chips-halong-mining\/ (2018).  Nick Marinoff. 2018. Samsung Is Building ASIC Chips for Halong Mining. URL https:\/\/bitcoinmagazine.com\/articles\/samsung-building-asic-chips-halong-mining\/ (2018).","key":"e_1_3_2_1_30_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1007\/11779360_14"},{"key":"e_1_3_2_1_32_1","first-page":"259","article-title":"Differential Path for SHA-1 with complexity O (252)","volume":"2009","author":"McDonald Cameron","year":"2009","journal-title":"IACR Cryptology ePrint Archive"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.1007\/11799313_18"},{"unstructured":"Florian Mendel Christian Rechberger and Vincent Rijmen. 2007. Update on SHA-1. rump session of CRYPTO 2007 (2007).  Florian Mendel Christian Rechberger and Vincent Rijmen. 2007. Update on SHA-1. rump session of CRYPTO 2007 (2007).","key":"e_1_3_2_1_34_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.1007\/11935230_2"},{"unstructured":"Thomas Peyrin. 2008. Analyse de fonctions de hachage cryptographiques. Ph.D. Dissertation. PhD thesis University of Versailles.  Thomas Peyrin. 2008. Analyse de fonctions de hachage cryptographiques. Ph.D. Dissertation. PhD thesis University of Versailles.","key":"e_1_3_2_1_36_1"},{"doi-asserted-by":"crossref","unstructured":"John M Pollard. 1978. Monte Carlo methods for index computation (\u00f0\u0130\u00f0\u017e\u00f0\u0130\u015a\u0130J\u00f0\u0130\u015a\u015a\u00f0\u0130\u015a\u0130). Mathematics of computation 32 143 (1978) 918--924.  John M Pollard. 1978. Monte Carlo methods for index computation (\u00f0\u0130\u00f0\u017e\u00f0\u0130\u015a\u0130J\u00f0\u0130\u015a\u015a\u00f0\u0130\u015a\u0130). Mathematics of computation 32 143 (1978) 918--924.","key":"e_1_3_2_1_37_1","DOI":"10.1090\/S0025-5718-1978-0491431-9"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_38_1","DOI":"10.1007\/11586821_7"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_39_1","DOI":"10.1007\/978-3-642-61812-3"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_40_1","DOI":"10.1007\/978-3-540-30574-3_6"},{"volume-title":"FWS01 Quantum Cryptography","author":"Santha Mikolos","key":"e_1_3_2_1_41_1"},{"doi-asserted-by":"crossref","unstructured":"Mark Stamp and Richard M Low. 2007. Applied cryptanalysis: breaking ciphers in the real world. John Wiley & Sons.   Mark Stamp and Richard M Low. 2007. Applied cryptanalysis: breaking ciphers in the real world. John Wiley & Sons.","key":"e_1_3_2_1_42_1","DOI":"10.1002\/9780470148778"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_43_1","DOI":"10.1007\/978-3-642-38348-9_15"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_44_1","DOI":"10.1007\/978-3-319-63688-7_19"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_45_1","DOI":"10.1007\/978-3-662-49890-3_18"},{"unstructured":"Marc Martinus Jacobus Stevens etal 2012. Attacks on hash functions and applications. Mathematical Institute Faculty of Science Leiden University.  Marc Martinus Jacobus Stevens et al. 2012. Attacks on hash functions and applications. Mathematical Institute Faculty of Science Leiden University.","key":"e_1_3_2_1_46_1"},{"key":"e_1_3_2_1_47_1","first-page":"200","article-title":"Bitcoin mining hardware accelerator with optimized message digest and message scheduler datapath","volume":"15","author":"Suresh Vikram","year":"2018","journal-title":"US Patent App."},{"unstructured":"Christopher Swenson. 2008. Modern cryptanalysis: techniques for advanced code breaking. John Wiley & Sons.   Christopher Swenson. 2008. Modern cryptanalysis: techniques for advanced code breaking. John Wiley & Sons.","key":"e_1_3_2_1_48_1"},{"unstructured":"Eran Tromer. 2007. Hardware-based cryptanalysis.  Eran Tromer. 2007. Hardware-based cryptanalysis.","key":"e_1_3_2_1_49_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_50_1","DOI":"10.1007\/PL00003816"},{"volume-title":"Invited Talk at the Cryptographer's Track at RSA Conference","year":"2006","author":"Wang Xiaoyun","key":"e_1_3_2_1_51_1"},{"volume-title":"Cryptographic Hash Workshop hosted by NIST.","year":"2005","author":"Wang Xiaoyun","key":"e_1_3_2_1_52_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_53_1","DOI":"10.1007\/11535218_2"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_54_1","DOI":"10.1007\/11535218_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_55_1","DOI":"10.1145\/1368310.1368316"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_56_1","DOI":"10.5555\/1770231.1770237"}],"event":{"acronym":"SAMOS XVIII","name":"SAMOS XVIII: Architectures, Modeling, and Simulation","location":"Pythagorion Greece"},"container-title":["Proceedings of the 18th International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3229631.3239366","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3229631.3239366","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:38Z","timestamp":1750212458000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3229631.3239366"}},"subtitle":["a Survey"],"short-title":[],"issued":{"date-parts":[[2018,7,15]]},"references-count":56,"alternative-id":["10.1145\/3229631.3239366","10.1145\/3229631"],"URL":"https:\/\/doi.org\/10.1145\/3229631.3239366","relation":{},"subject":[],"published":{"date-parts":[[2018,7,15]]},"assertion":[{"value":"2018-07-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}