Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers (Q3455502): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
ReferenceBot (talk | contribs)
Changed an Item
 
(7 intermediate revisions by 4 users not shown)
Property / describes a project that uses
 
Property / describes a project that uses: CLEFIA / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: TWINE / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: KTANTAN / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: LBlock / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-642-35999-6_16 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W131718440 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The block cipher Square / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3046344 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2760977 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4537993 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Saturation Attack — A Bait for Twofish / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4473600 / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Observation on Camellia / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3046342 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The 128-Bit Blockcipher CLEFIA (Extended Abstract) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Analysis of the SMS4 Block Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Saturation Attack on the Block Cipher HIGHT / rank
 
Normal rank
Property / cites work
 
Property / cites work: LBlock: A Lightweight Block Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN / rank
 
Normal rank
Property / cites work
 
Property / cites work: Impossible Differential Attacks on Reduced-Round LBlock / rank
 
Normal rank
Property / cites work
 
Property / cites work: A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock / rank
 
Normal rank
Property / cites work
 
Property / cites work: Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT / rank
 
Normal rank
Property / cites work
 
Property / cites work: Related-Key Attack on the Full HIGHT / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA / rank
 
Normal rank
Property / cites work
 
Property / cites work: Impossible differential attacks on 13-round CLEFIA-128 / rank
 
Normal rank
Property / cites work
 
Property / cites work: HIGHT: A New Block Cipher Suitable for Low-Resource Device / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 03:30, 11 July 2024

scientific article
Language Label Description Also known as
English
Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers
scientific article

    Statements

    Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers (English)
    0 references
    0 references
    0 references
    4 December 2015
    0 references
    integral attack
    0 references
    meet-in-the-middle
    0 references
    Feistel
    0 references
    partial-sum
    0 references
    LBlock
    0 references
    HIGHT
    0 references
    CLEFIA
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers