Improved Meet-in-the-Middle Distinguisher on Feistel Schemes
From MaRDI portal
Publication:2807199
DOI10.1007/978-3-319-31301-6_7zbMath1396.94089OpenAlexW2185035398MaRDI QIDQ2807199
Yafei Zheng, Wenling Wu, Li Lin
Publication date: 19 May 2016
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-31301-6_7
block ciphersCamelliaCLEFIAautomatic search algorithmefficient tabulation techniqueimproved meet-in-the-middle attack
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- CLEFIA
- The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
- Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis
- Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128
- Meet-in-the-Middle Attacks on Generic Feistel Constructions
- Improved Single-Key Attacks on 9-Round AES-192/256
- Zero-Correlation Linear Cryptanalysis with FFT and Improved Attacks on ISO Standards Camellia and CLEFIA
- New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256
- Improved Single-Key Attacks on 8-Round AES-192 and AES-256
- The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA
- General Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher
- All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach
- The 128-Bit Blockcipher CLEFIA (Extended Abstract)
- A Meet-in-the-Middle Attack on 8-Round AES
- Improved Meet-in-the-Middle Attacks on AES
- Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
This page was built for publication: Improved Meet-in-the-Middle Distinguisher on Feistel Schemes