Generalized MitM attacks on full TWINE
From MaRDI portal
Publication:894457
DOI10.1016/j.ipl.2015.09.011zbMath1346.94130OpenAlexW1793141329MaRDI QIDQ894457
Publication date: 1 December 2015
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2015.09.011
Uses Software
Cites Work
- Biclique cryptanalysis of LBlock and TWINE
- Multidimensional Meet-in-the-Middle Attacks on Reduced-Round TWINE-128
- Block Ciphers That Are Easier to Mask: How Far Can We Go?
- Bicliques with Minimal Data and Time Complexity for AES
- Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- Biclique Cryptanalysis of the Full AES
- Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
- Improving the Biclique Cryptanalysis of AES
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- HIGHT: A New Block Cipher Suitable for Low-Resource Device
- PRESENT: An Ultra-Lightweight Block Cipher
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
- On Bruteforce-Like Cryptanalysis: New Meet-in-the-Middle Attacks in Symmetric Cryptanalysis