Recommendations
- scientific article; zbMATH DE number 7310082
- Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework
- Meet-in-the-middle attack on TWINE block cipher
- On parallel computations in implementation of the meat-in-the-middle attack
- Meet-in-the-middle attack on reduced versions of the Camellia block cipher
- Meet-in-the-middle technique for integral attacks against Feistel ciphers
- Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE
- Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE
- Meet-in-the-middle attacks on reduced-round Hierocrypt-3
Cites work
- scientific article; zbMATH DE number 176549 (Why is no real title available?)
- Advances in Cryptology – CRYPTO 2004
- Cryptanalysis of \textsc{Widea}
- Cryptanalysis of full sprout
- Cryptanalysis of reduced-round KLEIN block cipher
- Improved Attacks on Full GOST
- Improved Meet-in-the-Middle Attacks on Reduced-Round DES
- KLEIN: a new family of lightweight block ciphers
- Low-Data Complexity Attacks on AES
- Practical attack on 8 rounds of the lightweight block cipher KLEIN
Cited in
(7)- Practical attack on 8 rounds of the lightweight block cipher KLEIN
- On parallel computations in implementation of the meat-in-the-middle attack
- Cryptanalysis of reduced-round KLEIN block cipher
- Cryptanalysis of ARMADILLO2
- Match box meet-in-the-middle attack against KATAN
- Finding three-subset division property for ciphers with complex linear layers
- Improved linear sieving techniques with applications to step-reduced LED-64
This page was built for publication: The parallel-cut meet-in-the-middle attack
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q892391)