The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
From MaRDI portal
Publication:2437779
DOI10.1016/J.TCS.2014.01.031zbMATH Open1291.94120OpenAlexW2018423785WikidataQ123220854 ScholiaQ123220854MaRDI QIDQ2437779FDOQ2437779
Jongsung Kim, E. Pasalic, Y. Wei, Jiqiang Lu
Publication date: 13 March 2014
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2014.01.031
Recommendations
- The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
- Meet-in-the-middle attack on reduced versions of the Camellia block cipher
- Selected Areas in Cryptography
- Meet-in-the-middle technique for integral attacks against Feistel ciphers
- Provable Security Evaluation of Block Ciphers Against Demirci-Selçuk’s Meet-in-the-Middle Attack
- A simple power analysis attack against the key schedule of the Camellia block cipher
- Meet-in-the-middle attacks on reduced-round Hierocrypt-3
- Higher-order differential meet-in-the-middle preimage attacks on SHA-1 and BLAKE
- Meet-in-the-middle attack on 11-round 3D block cipher
Cites Work
- Title not available (Why is that?)
- Higher Order Derivatives and Differential Cryptanalysis
- Title not available (Why is that?)
- Differential cryptanalysis of DES-like cryptosystems
- A cryptanalytic time-memory trade-off
- Title not available (Why is that?)
- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
- Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis
- Improved Single-Key Attacks on 8-Round AES-192 and AES-256
- A Meet-in-the-Middle Attack on 8-Round AES
- Title not available (Why is that?)
- The block cipher Square
- Structural cryptanalysis of SASAS
- Title not available (Why is that?)
- Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher
- Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others
- The Higher-Order Meet-in-the-Middle Attack and Its Application to the Camellia Block Cipher
- Improved meet-in-the-middle attacks on AES
- New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia
- New Impossible Differential Attacks on Camellia
- Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits
- New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256
- New Results on Impossible Differential Cryptanalysis of Reduced–Round Camellia–128
- Title not available (Why is that?)
- New Observation on Camellia
- Selected Areas in Cryptography
Cited In (5)
- Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis
- A simple power analysis attack against the key schedule of the Camellia block cipher
- Improved Meet-in-the-Middle Distinguisher on Feistel Schemes
- Title not available (Why is that?)
- Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers
Uses Software
This page was built for publication: The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2437779)