Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE
From MaRDI portal
Publication:2946943
DOI10.1007/978-3-662-48116-5_10zbMath1367.94308OpenAlexW392155942MaRDI QIDQ2946943
Publication date: 18 September 2015
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-48116-5_10
Related Items (6)
A new non-random property of 4.5-round PRINCE ⋮ PRINCEv2. More security for (almost) no overhead ⋮ Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE ⋮ Meet-in-the-middle preimage attacks on sponge-based hashing ⋮ Cryptanalysis of Feistel Networks with Secret Round Functions ⋮ Quantum Demiric-Selcuk meet-in-the-middle attacks on reduced-round AES
This page was built for publication: Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE