The parallel-cut meet-in-the-middle attack
From MaRDI portal
Publication:892391
DOI10.1007/S12095-014-0118-1zbMATH Open1343.94074OpenAlexW2101399232MaRDI QIDQ892391FDOQ892391
Authors: Ivica Nikolić, Lei Wang, Shuang Wu
Publication date: 19 November 2015
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12095-014-0118-1
Recommendations
- scientific article; zbMATH DE number 7310082
- Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework
- Meet-in-the-middle attack on TWINE block cipher
- On parallel computations in implementation of the meat-in-the-middle attack
- Meet-in-the-middle attack on reduced versions of the Camellia block cipher
- Meet-in-the-middle technique for integral attacks against Feistel ciphers
- Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE
- Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE
- Meet-in-the-middle attacks on reduced-round Hierocrypt-3
hash functionblock ciphercryptanalysismeet-in-the-middle attacklightweight block cipher Kleinparallel-cut
Cites Work
- Cryptanalysis of WIDEA
- Improved Attacks on Full GOST
- KLEIN: A New Family of Lightweight Block Ciphers
- Improved Meet-in-the-Middle Attacks on Reduced-Round DES
- Advances in Cryptology – CRYPTO 2004
- Low-Data Complexity Attacks on AES
- Practical attack on 8 rounds of the lightweight block cipher KLEIN
- Cryptanalysis of Full Sprout
- Title not available (Why is that?)
- Cryptanalysis of Reduced-Round KLEIN Block Cipher
Cited In (3)
Uses Software
This page was built for publication: The parallel-cut meet-in-the-middle attack
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q892391)