Pages that link to "Item:Q2129000"
From MaRDI portal
The following pages link to Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks (Q2129000):
Displaying 13 items.
- Extended meet-in-the-middle attacks on some Feistel constructions (Q2630716) (← links)
- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 (Q3058649) (← links)
- Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others (Q3634495) (← links)
- Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2 (Q4899710) (← links)
- Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework (Q6048704) (← links)
- Improved attacks against reduced-round Whirlwind (Q6063133) (← links)
- \textit{Caveat implementor!} Key recovery attacks on MEGA (Q6083661) (← links)
- Triangulating rebound attack on AES-like hashing (Q6097258) (← links)
- Automatic search of linear structure: applications to \textsc{Keccak} and \textsc{Ascon} (Q6575044) (← links)
- Automated meet-in-the-middle attack goes to Feistel (Q6595820) (← links)
- Improved differential meet-in-the-middle cryptanalysis (Q6636395) (← links)
- Diving deep into the preimage security of AES-like hashing (Q6636399) (← links)
- Generic MitM attack frameworks on sponge constructions (Q6652908) (← links)