Efficient dissection of bicomposite problems with cryptanalytic applications
From MaRDI portal
Publication:2010595
Recommendations
- Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems
- From multiple encryption to knapsacks -- efficient dissection of composite problems
- An algorithmic framework for the generalized birthday problem
- A cryptanalytic time-memory trade-off
- Time-memory-processor trade-offs
Cites work
- scientific article; zbMATH DE number 3750146 (Why is no real title available?)
- A $T = O(2^{n/2} )$, $S = O(2^{n/4} )$ Algorithm for Certain NP-Complete Problems
- A cryptanalytic time-memory trade-off
- A single-key attack on the full GOST block cipher
- Advances in Cryptology – CRYPTO 2004
- Attacking triple encryption
- Cryptanalysis of full sprout
- Cryptanalysis of triple modes of operation
- Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems
- How to improve rebound attacks
- Improved Attacks on Full GOST
- Improved Generic Algorithms for Hard Knapsacks
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities
- Improving implementable meet-in-the-middle attacks by orders of magnitude
- Keying hash functions for message authentication
- New attacks on Feistel structures with improved memory complexities
- New generic algorithms for hard knapsacks
- On the power of cascade ciphers
- Saving space by algebraization
- Sieve-in-the-middle: improved MITM attacks
- Space-efficient randomized algorithms for \(k\)-sum
- Space-time tradeoffs for subset sum: an improved worst case algorithm
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- The rebound attack and subspace distinguishers: application to Whirlpool
Cited in
(6)- Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems
- Adventures in crypto dark matter: attacks, fixes and analysis for weak pseudorandom functions
- Quantum Key Recovery Attacks on 3-Round Feistel-2 Structure Without Quantum Encryption Oracles
- Optimum attack on 3-round Feistel-2 structure
- An algorithmic framework for the generalized birthday problem
- From multiple encryption to knapsacks -- efficient dissection of composite problems
This page was built for publication: Efficient dissection of bicomposite problems with cryptanalytic applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2010595)