Meet-in-the-middle technique for integral attacks against Feistel ciphers
From MaRDI portal
Publication:3455502
Recommendations
Cites work
- scientific article; zbMATH DE number 1682693 (Why is no real title available?)
- scientific article; zbMATH DE number 2089129 (Why is no real title available?)
- scientific article; zbMATH DE number 2089131 (Why is no real title available?)
- scientific article; zbMATH DE number 2080696 (Why is no real title available?)
- scientific article; zbMATH DE number 1759272 (Why is no real title available?)
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock
- Analysis of the SMS4 Block Cipher
- HIGHT: A New Block Cipher Suitable for Low-Resource Device
- Impossible differential attacks on 13-round CLEFIA-128
- Impossible differential attacks on reduced-round LBlock
- Impossible differential cryptanalysis of the lightweight block ciphers TEA, XTEA and HIGHT
- LBlock: a lightweight block cipher
- New Observation on Camellia
- Related-key attack on the full HIGHT
- Saturation Attack on the Block Cipher HIGHT
- The 128-Bit Blockcipher CLEFIA (Extended Abstract)
- The Saturation Attack — A Bait for Twofish
- The block cipher \textsc{Square}
- The improbable differential attack: cryptanalysis of reduced round CLEFIA
Cited in
(21)- Bit-Pattern Based Integral Attack
- Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework
- The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
- Differential sieving for 2-step matching meet-in-the-middle attack with application to lblock
- A higher order key partitioning attack with application to LBlock
- Integral characteristics by keyspace partitioning
- New differential bounds and division property of Lilliput: block cipher with extended generalized Feistel network
- The parallel-cut meet-in-the-middle attack
- Integral Cryptanalysis of Reduced-Round Tweakable TWINE
- Finding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacks
- Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard
- Improved Meet-in-the-Middle Distinguisher on Feistel Schemes
- Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers
- Partial sums meet FFT: improved attack on 6-round AES
- FFT key recovery for integral attack
- Meet in the middle attack on type-1 Feistel construction
- Improved integral and zero-correlation linear cryptanalysis of CLEFIA block cipher
- Comprehensive study of integral analysis on 22-round LBlock
- Extended meet-in-the-middle attacks on some Feistel constructions
- Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants
- Integral cryptanalysis on full MISTY1
This page was built for publication: Meet-in-the-middle technique for integral attacks against Feistel ciphers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3455502)