Pages that link to "Item:Q3084257"
From MaRDI portal
The following pages link to A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN (Q3084257):
Displaying 31 items.
- A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock (Q456064) (← links)
- Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64 (Q458737) (← links)
- An improved preimage attack against \texttt{HAVAL-3} (Q477698) (← links)
- What is the effective key length for a block cipher: an attack on every practical block cipher (Q893734) (← links)
- Generalized MitM attacks on full TWINE (Q894457) (← links)
- Analysis of \(3\)-line generalized Feistel networks with double SD-functions (Q1944105) (← links)
- A single-key attack on the full GOST block cipher (Q1946603) (← links)
- Cryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-2 (Q2056728) (← links)
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks (Q2129000) (← links)
- Refined cryptanalysis of the GPRS ciphers GEA-1 and GEA-2 (Q2170080) (← links)
- Quark: a lightweight hash (Q2377065) (← links)
- Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher (Q2794511) (← links)
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS (Q2829213) (← links)
- Conditional Differential Cryptanalysis of Trivium and KATAN (Q2889871) (← links)
- Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64 (Q2889872) (← links)
- Bicliques with Minimal Data and Time Complexity for AES (Q2942833) (← links)
- Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3 (Q2946449) (← links)
- Cryptanalysis of Round-Reduced $$\mathtt{LED}$$ (Q2946874) (← links)
- A Higher Order Key Partitioning Attack with Application to LBlock (Q2947084) (← links)
- LBlock: A Lightweight Block Cipher (Q3011308) (← links)
- A Single-Key Attack on the Full GOST Block Cipher (Q3013090) (← links)
- Cryptanalysis of the Light-Weight Cipher A2U2 (Q3104709) (← links)
- An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers (Q3455483) (← links)
- All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach (Q3455500) (← links)
- Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers (Q3455502) (← links)
- New Attacks on Feistel Structures with Improved Memory Complexities (Q3457122) (← links)
- Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE (Q4639481) (← links)
- Block cipher invariants as eigenvectors of correlation matrices (Q5915627) (← links)
- Automated meet-in-the-middle attack goes to Feistel (Q6595820) (← links)
- Diving deep into the preimage security of AES-like hashing (Q6636399) (← links)
- Generic MitM attack frameworks on sponge constructions (Q6652908) (← links)