Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers
From MaRDI portal
Publication:3455502
DOI10.1007/978-3-642-35999-6_16zbMath1327.94073OpenAlexW131718440MaRDI QIDQ3455502
Publication date: 4 December 2015
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-35999-6_16
Related Items (9)
Integral cryptanalysis on full MISTY1 ⋮ A Higher Order Key Partitioning Attack with Application to LBlock ⋮ Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework ⋮ Finding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacks ⋮ New differential bounds and division property of Lilliput: block cipher with extended generalized Feistel network ⋮ Improved Integral and Zero-correlation Linear Cryptanalysis of CLEFIA Block Cipher ⋮ Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard ⋮ Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants ⋮ Integral characteristics by keyspace partitioning
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock
- Impossible differential attacks on 13-round CLEFIA-128
- Impossible Differential Attacks on Reduced-Round LBlock
- Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT
- LBlock: A Lightweight Block Cipher
- The Saturation Attack — A Bait for Twofish
- The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- Related-Key Attack on the Full HIGHT
- HIGHT: A New Block Cipher Suitable for Low-Resource Device
- The 128-Bit Blockcipher CLEFIA (Extended Abstract)
- Analysis of the SMS4 Block Cipher
- Saturation Attack on the Block Cipher HIGHT
- The block cipher Square
- New Observation on Camellia
This page was built for publication: Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers