The Higher-Order Meet-in-the-Middle Attack and Its Application to the Camellia Block Cipher
From MaRDI portal
Publication:2876936
DOI10.1007/978-3-642-34931-7_15zbMath1295.94110OpenAlexW1928164016MaRDI QIDQ2876936
Jiqiang Lu, Jongsung Kim, Enes Pašalić, Yongzhuang Wei
Publication date: 20 August 2014
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-34931-7_15
Related Items (3)
The higher-order meet-in-the-middle attack and its application to the Camellia block cipher ⋮ Improved Attacks on Reduced-Round Camellia-128/192/256 ⋮ Impossible Differential Cryptanalysis of 14-Round Camellia-192
Uses Software
This page was built for publication: The Higher-Order Meet-in-the-Middle Attack and Its Application to the Camellia Block Cipher