Match Box Meet-in-the-Middle Attack Against KATAN
From MaRDI portal
Publication:2946903
DOI10.1007/978-3-662-46706-0_4zbMath1382.94106OpenAlexW275677510MaRDI QIDQ2946903
Publication date: 18 September 2015
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-46706-0_4
Related Items (9)
Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks ⋮ Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression ⋮ Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework ⋮ Improved attacks against reduced-round Whirlwind ⋮ Meet-in-the-middle preimage attacks on sponge-based hashing ⋮ Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing ⋮ Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256} ⋮ Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression ⋮ Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework
This page was built for publication: Match Box Meet-in-the-Middle Attack Against KATAN