Improved meet-in-the-middle cryptanalysis of KTANTAN (poster)
From MaRDI portal
Publication:3013012
Recommendations
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- Improved multi-dimensional meet-in-the-middle cryptanalysis of KATAN
- Some instant- and practical-time related-key attacks on KTANTAN32/48/64
- Match box meet-in-the-middle attack against KATAN
- Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64
Cited in
(17)- Improved (related-key) attacks on round-reduced KATAN-32/48/64 based on the extended boomerang framework
- Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- Some instant- and practical-time related-key attacks on KTANTAN32/48/64
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
- Advancing the meet-in-the-filter technique: applications to CHAM and KATAN
- Match box meet-in-the-middle attack against KATAN
- New attacks on IDEA with at least 6 rounds
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
- Quark: a lightweight hash
- Packed ciphertexts in LWE-based homomorphic encryption
- A framework for automated independent-biclique cryptanalysis
- Automatic search of meet-in-the-middle and impossible differential attacks
- Improved multi-dimensional meet-in-the-middle cryptanalysis of KATAN
- All subkeys recovery attack on block ciphers: extending meet-in-the-middle approach
- An improved preimage attack against \texttt{HAVAL-3}
- Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64
This page was built for publication: Improved meet-in-the-middle cryptanalysis of KTANTAN (poster)
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3013012)