Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3
From MaRDI portal
Publication:2946449
DOI10.1007/978-3-319-22174-8_11zbMath1370.94474OpenAlexW1725695101MaRDI QIDQ2946449
Mohamed Tolba, Amr M. Youssef, Riham AlTawy, Ahmed Abdelkhalek
Publication date: 17 September 2015
Published in: Progress in Cryptology -- LATINCRYPT 2015 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-22174-8_11
Cites Work
- Unnamed Item
- Sieve-in-the-Middle: Improved MITM Attacks
- Differential Sieving for 2-Step Matching Meet-in-the-Middle Attack with Application to LBlock
- Improved Square Attacks against Reduced-Round Hierocrypt
- Improved Single-Key Attacks on 8-Round AES-192 and AES-256
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- Biclique Cryptanalysis of the Full AES
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- Second Preimage Analysis of Whirlwind
- A Meet-in-the-Middle Attack on 8-Round AES
- Improved Meet-in-the-Middle Attacks on AES
- The block cipher Square
- Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks
- Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
- Preimage Attacks on Reduced-Round Stribog
This page was built for publication: Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3