Improved Meet-in-the-Middle Attacks on Reduced-Round DES
From MaRDI portal
Publication:5458203
DOI10.1007/978-3-540-77026-8_8zbMath1153.94371OpenAlexW1954145964MaRDI QIDQ5458203
Bart Preneel, Orr Dunkelman, Gautham Sekar
Publication date: 11 April 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-77026-8_8
Related Items (12)
Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks ⋮ The parallel-cut meet-in-the-middle attack ⋮ Meet-in-the-middle preimage attacks on sponge-based hashing ⋮ Differential meet-in-the-middle cryptanalysis ⋮ Simplified MITM modeling for permutations: new (quantum) attacks ⋮ A single-key attack on the full GOST block cipher ⋮ An improved preimage attack against \texttt{HAVAL-3} ⋮ A Single-Key Attack on the Full GOST Block Cipher ⋮ Meet-in-the-Middle Attacks on Reduced-Round XTEA ⋮ Cryptanalysis of CTC2 ⋮ A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN ⋮ Cryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-2
Cites Work
- Solving multiple right hand sides linear equations
- An improvement of Davies' attack on DES
- Pairs and triplets of DES S-boxes
- A cryptanalytic time-memory trade-off
- Algebraic Cryptanalysis of the Data Encryption Standard
- New Improvements of Davies-Murphy Cryptanalysis
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Improved Meet-in-the-Middle Attacks on Reduced-Round DES