Match Box Meet-in-the-Middle Attack Against KATAN
From MaRDI portal
Publication:2946903
DOI10.1007/978-3-662-46706-0_4zbMath1382.94106MaRDI QIDQ2946903
Publication date: 18 September 2015
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-46706-0_4
94A60: Cryptography
Related Items
Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression, Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework, Improved attacks against reduced-round Whirlwind, Meet-in-the-middle preimage attacks on sponge-based hashing, Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing, Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}, Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks, Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression, Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework