Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers
From MaRDI portal
Publication:3455502
DOI10.1007/978-3-642-35999-6_16zbMATH Open1327.94073OpenAlexW131718440MaRDI QIDQ3455502FDOQ3455502
Publication date: 4 December 2015
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-35999-6_16
Cites Work
- LBlock: A Lightweight Block Cipher
- Title not available (Why is that?)
- The 128-Bit Blockcipher CLEFIA (Extended Abstract)
- Impossible differential attacks on 13-round CLEFIA-128
- Impossible Differential Attacks on Reduced-Round LBlock
- A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- HIGHT: A New Block Cipher Suitable for Low-Resource Device
- Title not available (Why is that?)
- Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT
- Title not available (Why is that?)
- The block cipher Square
- Analysis of the SMS4 Block Cipher
- The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA
- The Saturation Attack — A Bait for Twofish
- Related-Key Attack on the Full HIGHT
- New Observation on Camellia
- Saturation Attack on the Block Cipher HIGHT
- Title not available (Why is that?)
- Title not available (Why is that?)
Cited In (16)
- The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
- Integral characteristics by keyspace partitioning
- Integral cryptanalysis on full MISTY1
- A Higher Order Key Partitioning Attack with Application to LBlock
- Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard
- Improved Meet-in-the-Middle Distinguisher on Feistel Schemes
- Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers
- Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework
- The parallel-cut meet-in-the-middle attack
- Improved Integral and Zero-correlation Linear Cryptanalysis of CLEFIA Block Cipher
- Finding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacks
- Partial sums meet FFT: improved attack on 6-round AES
- Integral Cryptanalysis of Reduced-Round Tweakable TWINE
- Extended meet-in-the-middle attacks on some Feistel constructions
- Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants
- New differential bounds and division property of Lilliput: block cipher with extended generalized Feistel network
Uses Software
This page was built for publication: Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3455502)