Pages that link to "Item:Q2056714"
From MaRDI portal
The following pages link to Automatic search of meet-in-the-middle preimage attacks on AES-like hashing (Q2056714):
Displaying 15 items.
- Pholkos -- efficient large-state tweakable block ciphers from the AES round function (Q2152178) (← links)
- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 (Q3058649) (← links)
- Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others (Q3634495) (← links)
- Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2 (Q4899710) (← links)
- Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework (Q6048704) (← links)
- Improved attacks against reduced-round Whirlwind (Q6063133) (← links)
- Improved graph-based model for recovering superpoly on Trivium (Q6080905) (← links)
- Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing (Q6097257) (← links)
- Triangulating rebound attack on AES-like hashing (Q6097258) (← links)
- Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256} (Q6135400) (← links)
- Simplified MITM modeling for permutations: new (quantum) attacks (Q6163972) (← links)
- Automatic search of linear structure: applications to \textsc{Keccak} and \textsc{Ascon} (Q6575044) (← links)
- Automated meet-in-the-middle attack goes to Feistel (Q6595820) (← links)
- Diving deep into the preimage security of AES-like hashing (Q6636399) (← links)
- Generic MitM attack frameworks on sponge constructions (Q6652908) (← links)