The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
From MaRDI portal
Publication:2437779
DOI10.1016/j.tcs.2014.01.031zbMath1291.94120OpenAlexW2018423785WikidataQ123220854 ScholiaQ123220854MaRDI QIDQ2437779
Jongsung Kim, Jiqiang Lu, Enes Pašalić, Yongzhuang Wei
Publication date: 13 March 2014
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2014.01.031
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Structural cryptanalysis of SASAS
- Differential cryptanalysis of DES-like cryptosystems
- Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis
- The Higher-Order Meet-in-the-Middle Attack and Its Application to the Camellia Block Cipher
- New Impossible Differential Attacks on Camellia
- Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits
- New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256
- Improved Single-Key Attacks on 8-Round AES-192 and AES-256
- A Meet-in-the-Middle Attack on 8-Round AES
- Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others
- New Results on Impossible Differential Cryptanalysis of Reduced–Round Camellia–128
- Improved Meet-in-the-Middle Attacks on AES
- A cryptanalytic time-memory trade-off
- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
- The block cipher Square
- Higher Order Derivatives and Differential Cryptanalysis
- New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia
- Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher
- New Observation on Camellia
- Selected Areas in Cryptography
This page was built for publication: The higher-order meet-in-the-middle attack and its application to the Camellia block cipher