Meet-in-the-Middle Attacks on Reduced-Round XTEA
From MaRDI portal
Publication:3073711
DOI10.1007/978-3-642-19074-2_17zbMath1284.94109OpenAlexW1503378629MaRDI QIDQ3073711
Gautham Sekar, Vesselin Velichkov, Nicky Mouha, Bart Preneel
Publication date: 11 February 2011
Published in: Topics in Cryptology – CT-RSA 2011 (Search for Journal in Brave)
Full work available at URL: http://www.cosic.esat.kuleuven.be/publications/article-2403.pdf
Related Items (4)
Zero-correlation attacks: statistical models independent of the number of approximations ⋮ An improved preimage attack against \texttt{HAVAL-3} ⋮ Атака на ГОСТ с уменьшенным числом итераций методом согласования ⋮ Revisiting key schedule's diffusion in relation with round function's diffusion
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A Weak Key Class of XTEA for a Related-Key Rectangle Attack
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- Another Look at Complementation Properties
- Finding Preimages in Full MD5 Faster Than Exhaustive Search
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- Communication Theory of Secrecy Systems*
- Preimages for Step-Reduced SHA-2
- Improved Meet-in-the-Middle Attacks on Reduced-Round DES
- A Practical Attack on KeeLoq
- Chai-Tea, Cryptographic Hardware Implementations of xTEA
- Fast Software Encryption
- Information Security and Cryptology - ICISC 2003
This page was built for publication: Meet-in-the-Middle Attacks on Reduced-Round XTEA