The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
From MaRDI portal
Publication:2437779
Recommendations
- The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
- Meet-in-the-middle attack on reduced versions of the Camellia block cipher
- Selected Areas in Cryptography
- Meet-in-the-middle technique for integral attacks against Feistel ciphers
- Provable Security Evaluation of Block Ciphers Against Demirci-Selçuk’s Meet-in-the-Middle Attack
- A simple power analysis attack against the key schedule of the Camellia block cipher
- Meet-in-the-middle attacks on reduced-round Hierocrypt-3
- Higher-order differential meet-in-the-middle preimage attacks on SHA-1 and BLAKE
- Meet-in-the-middle attack on 11-round 3D block cipher
Cites work
- scientific article; zbMATH DE number 1722685 (Why is no real title available?)
- scientific article; zbMATH DE number 2089131 (Why is no real title available?)
- scientific article; zbMATH DE number 1951609 (Why is no real title available?)
- scientific article; zbMATH DE number 1455090 (Why is no real title available?)
- scientific article; zbMATH DE number 1394292 (Why is no real title available?)
- scientific article; zbMATH DE number 1418251 (Why is no real title available?)
- A Meet-in-the-Middle Attack on 8-Round AES
- A cryptanalytic time-memory trade-off
- Automatic search for related-key differential characteristics in byte-oriented block ciphers: application to AES, Camellia, Khazad and others
- Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis
- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
- Differential cryptanalysis of DES-like cryptosystems
- Higher Order Derivatives and Differential Cryptanalysis
- Improved meet-in-the-middle attacks on AES
- Improved single-key attacks on 8-round AES-192 and AES-256
- Meet-in-the-middle attack on 8 rounds of the AES block cipher under 192 key bits
- Meet-in-the-middle attack on reduced versions of the Camellia block cipher
- New Observation on Camellia
- New Results on Impossible Differential Cryptanalysis of Reduced–Round Camellia–128
- New impossible differential attacks of reduced-round Camellia-192 and Camellia-256
- New impossible differential attacks on Camellia
- New observations on impossible differential cryptanalysis of reduced-round Camellia
- Selected Areas in Cryptography
- Structural cryptanalysis of SASAS
- The block cipher \textsc{Square}
- The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
Cited in
(7)- scientific article; zbMATH DE number 1951609 (Why is no real title available?)
- The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
- Meet-in-the-middle attack on reduced versions of the Camellia block cipher
- Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis
- A simple power analysis attack against the key schedule of the Camellia block cipher
- Improved Meet-in-the-Middle Distinguisher on Feistel Schemes
- Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers
This page was built for publication: The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2437779)