Meet-in-the-middle technique for integral attacks against Feistel ciphers
From MaRDI portal
Publication:3455502
DOI10.1007/978-3-642-35999-6_16zbMATH Open1327.94073OpenAlexW131718440MaRDI QIDQ3455502FDOQ3455502
Publication date: 4 December 2015
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-35999-6_16
Recommendations
Cites Work
- LBlock: a lightweight block cipher
- Title not available (Why is that?)
- The 128-Bit Blockcipher CLEFIA (Extended Abstract)
- Impossible differential attacks on 13-round CLEFIA-128
- Impossible differential attacks on reduced-round LBlock
- A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- HIGHT: A New Block Cipher Suitable for Low-Resource Device
- Title not available (Why is that?)
- Impossible differential cryptanalysis of the lightweight block ciphers TEA, XTEA and HIGHT
- Title not available (Why is that?)
- The block cipher \textsc{Square}
- Analysis of the SMS4 Block Cipher
- The improbable differential attack: cryptanalysis of reduced round CLEFIA
- The Saturation Attack — A Bait for Twofish
- Related-key attack on the full HIGHT
- New Observation on Camellia
- Saturation Attack on the Block Cipher HIGHT
- Title not available (Why is that?)
- Title not available (Why is that?)
Cited In (21)
- The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
- Differential sieving for 2-step matching meet-in-the-middle attack with application to lblock
- A higher order key partitioning attack with application to LBlock
- Integral characteristics by keyspace partitioning
- Meet in the middle attack on type-1 Feistel construction
- Integral cryptanalysis on full MISTY1
- Improved integral and zero-correlation linear cryptanalysis of CLEFIA block cipher
- Comprehensive study of integral analysis on 22-round LBlock
- Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard
- Improved Meet-in-the-Middle Distinguisher on Feistel Schemes
- Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers
- Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework
- The parallel-cut meet-in-the-middle attack
- FFT key recovery for integral attack
- Finding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacks
- Partial sums meet FFT: improved attack on 6-round AES
- Bit-Pattern Based Integral Attack
- Integral Cryptanalysis of Reduced-Round Tweakable TWINE
- Extended meet-in-the-middle attacks on some Feistel constructions
- Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants
- New differential bounds and division property of Lilliput: block cipher with extended generalized Feistel network
Uses Software
This page was built for publication: Meet-in-the-middle technique for integral attacks against Feistel ciphers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3455502)