Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64
From MaRDI portal
Publication:458737
DOI10.1007/s12095-014-0102-9zbMath1298.94118OpenAlexW2035522326MaRDI QIDQ458737
Publication date: 8 October 2014
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12095-014-0102-9
Related Items
A survey on implementation of lightweight block ciphers for resource constraints devices ⋮ Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework ⋮ AKF: a key alternating Feistel scheme for lightweight cipher designs ⋮ Атака на шифрсистему ГОСТ 28147-89 с 12 связанными ключами ⋮ Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework
Uses Software
Cites Work
- Narrow-Bicliques: Cryptanalysis of Full IDEA
- The Hummingbird-2 Lightweight Authenticated Encryption Algorithm
- Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems
- Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster)
- A Single-Key Attack on the Full GOST Block Cipher
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- Biclique Cryptanalysis of the Full AES
- The LED Block Cipher
- Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
- An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers
- All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach
- PRINTcipher: A Block Cipher for IC-Printing
- Finding Preimages in Full MD5 Faster Than Exhaustive Search
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
- Improved Attacks on Full GOST