Three-Subset Meet-in-the-Middle Attack on Reduced XTEA
From MaRDI portal
Publication:2900614
DOI10.1007/978-3-642-31410-0_9zbMath1304.94083OpenAlexW108067859MaRDI QIDQ2900614
K. Sakiyama, Yu Sasaki, Kazuo Ohta, Yusuke Sakai, Lei Wang
Publication date: 23 July 2012
Published in: Progress in Cryptology - AFRICACRYPT 2012 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-31410-0_9
Related Items (4)
Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks ⋮ All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach ⋮ Zero-correlation attacks: statistical models independent of the number of approximations ⋮ Revisiting key schedule's diffusion in relation with round function's diffusion
Uses Software
This page was built for publication: Three-Subset Meet-in-the-Middle Attack on Reduced XTEA