Efficient dissection of bicomposite problems with cryptanalytic applications
From MaRDI portal
Publication:2010595
DOI10.1007/S00145-018-9303-2zbMATH Open1435.94127OpenAlexW2888583758MaRDI QIDQ2010595FDOQ2010595
Adi Shamir, Orr Dunkelman, Nathan Keller, Itai Dinur
Publication date: 27 November 2019
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-018-9303-2
cryptanalysisknapsack problemsmultiple encryptiontime-memory tradeoffbicomposite problemsdissection algorithm
Cites Work
- Title not available (Why is that?)
- Advances in Cryptology – CRYPTO 2004
- Keying Hash Functions for Message Authentication
- Improved Generic Algorithms for Hard Knapsacks
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- A cryptanalytic time-memory trade-off
- A $T = O(2^{n/2} )$, $S = O(2^{n/4} )$ Algorithm for Certain NP-Complete Problems
- Saving space by algebraization
- Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems
- A Single-Key Attack on the Full GOST Block Cipher
- Improved Attacks on Full GOST
- How to Improve Rebound Attacks
- Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude
- New Generic Algorithms for Hard Knapsacks
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities
- The rebound attack and subspace distinguishers: application to Whirlpool
- Sieve-in-the-Middle: Improved MITM Attacks
- Attacking Triple Encryption
- Cryptanalysis of Full Sprout
- Cryptanalysis of triple modes of operation
- Space-Efficient Randomized Algorithms for K-SUM
- New Attacks on Feistel Structures with Improved Memory Complexities
- On the Power of Cascade Ciphers
- Space–Time Tradeoffs for Subset Sum: An Improved Worst Case Algorithm
Cited In (4)
- Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems
- Optimum attack on 3-round Feistel-2 structure
- Adventures in crypto dark matter: attacks, fixes and analysis for weak pseudorandom functions
- Quantum Key Recovery Attacks on 3-Round Feistel-2 Structure Without Quantum Encryption Oracles
This page was built for publication: Efficient dissection of bicomposite problems with cryptanalytic applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2010595)