The parallel-cut meet-in-the-middle attack
From MaRDI portal
Publication:892391
DOI10.1007/S12095-014-0118-1zbMATH Open1343.94074OpenAlexW2101399232MaRDI QIDQ892391FDOQ892391
Authors: Ivica Nikolić, Lei Wang, Shuang Wu
Publication date: 19 November 2015
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12095-014-0118-1
Recommendations
- scientific article; zbMATH DE number 7310082
- Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework
- Meet-in-the-middle attack on TWINE block cipher
- On parallel computations in implementation of the meat-in-the-middle attack
- Meet-in-the-middle attack on reduced versions of the Camellia block cipher
- Meet-in-the-middle technique for integral attacks against Feistel ciphers
- Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE
- Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE
- Meet-in-the-middle attacks on reduced-round Hierocrypt-3
hash functionblock ciphercryptanalysismeet-in-the-middle attacklightweight block cipher Kleinparallel-cut
Cites Work
- Cryptanalysis of \textsc{Widea}
- Improved Attacks on Full GOST
- KLEIN: a new family of lightweight block ciphers
- Improved Meet-in-the-Middle Attacks on Reduced-Round DES
- Advances in Cryptology – CRYPTO 2004
- Low-Data Complexity Attacks on AES
- Practical attack on 8 rounds of the lightweight block cipher KLEIN
- Cryptanalysis of full sprout
- Title not available (Why is that?)
- Cryptanalysis of reduced-round KLEIN block cipher
Cited In (7)
- Match box meet-in-the-middle attack against KATAN
- Cryptanalysis of ARMADILLO2
- Practical attack on 8 rounds of the lightweight block cipher KLEIN
- Cryptanalysis of reduced-round KLEIN block cipher
- On parallel computations in implementation of the meat-in-the-middle attack
- Finding three-subset division property for ciphers with complex linear layers
- Improved linear sieving techniques with applications to step-reduced LED-64
Uses Software
This page was built for publication: The parallel-cut meet-in-the-middle attack
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q892391)