Generalized MitM attacks on full TWINE
From MaRDI portal
Publication:894457
DOI10.1016/J.IPL.2015.09.011zbMATH Open1346.94130OpenAlexW1793141329MaRDI QIDQ894457FDOQ894457
Authors: Mohamed Tolba, A. M. Youssef
Publication date: 1 December 2015
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2015.09.011
Recommendations
Cites Work
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- Block ciphers that are easier to mask: how far can we go?
- PRESENT: An Ultra-Lightweight Block Cipher
- Biclique Cryptanalysis of the Full AES
- Multidimensional meet-in-the-middle attacks on reduced-round TWINE-128
- Biclique cryptanalysis of LBlock and TWINE
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
- HIGHT: A New Block Cipher Suitable for Low-Resource Device
- Differential analysis and meet-in-the-middle attack against round-reduced TWINE
- Bicliques with minimal data and time complexity for AES
- Improving the biclique cryptanalysis of AES
- On Bruteforce-Like Cryptanalysis: New Meet-in-the-Middle Attacks in Symmetric Cryptanalysis
Cited In (3)
Uses Software
This page was built for publication: Generalized MitM attacks on full TWINE
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q894457)