All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach (Q3455500): Difference between revisions

From MaRDI portal
Changed an Item
ReferenceBot (talk | contribs)
Changed an Item
 
(3 intermediate revisions by 3 users not shown)
Property / describes a project that uses
 
Property / describes a project that uses: FOX / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-642-35999-6_14 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W1513013279 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constructing symmetric ciphers using the CAST design procedure / rank
 
Normal rank
Property / cites work
 
Property / cites work: Preimage Attacks on One-Block MD4, 63-Step MD5 and More / rank
 
Normal rank
Property / cites work
 
Property / cites work: Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Preimages for Step-Reduced SHA-2 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Biclique Cryptanalysis of the Full AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN / rank
 
Normal rank
Property / cites work
 
Property / cites work: KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Single-Key Attack on the Full GOST Block Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Preimage Attacks on Reduced Tiger and SHA-2 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security Analysis of the Lightweight Block Ciphers XTEA, LED and Piccolo / rank
 
Normal rank
Property / cites work
 
Property / cites work: A New Class of Weak Keys for Blowfish / rank
 
Normal rank
Property / cites work
 
Property / cites work: Narrow-Bicliques: Cryptanalysis of Full IDEA / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family / rank
 
Normal rank
Property / cites work
 
Property / cites work: Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Parallel collision search with cryptanalytic applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Finding Preimages in Full MD5 Faster Than Exhaustive Search / rank
 
Normal rank
Property / cites work
 
Property / cites work: Three-Subset Meet-in-the-Middle Attack on Reduced XTEA / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the weak keys of blowfish / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256 / rank
 
Normal rank

Latest revision as of 04:30, 11 July 2024

scientific article
Language Label Description Also known as
English
All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach
scientific article

    Statements

    All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach (English)
    0 references
    0 references
    0 references
    4 December 2015
    0 references
    block cipher
    0 references
    meet-in-the-middle attack
    0 references
    key schedule
    0 references
    CAST-128
    0 references
    SHACAL-2
    0 references
    KATAN
    0 references
    FOX128
    0 references
    blowfish
    0 references
    all subkeys recovery attack
    0 references
    0 references
    0 references
    0 references

    Identifiers