A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN

From MaRDI portal
Publication:3084257

DOI10.1007/978-3-642-19574-7_16zbMath1292.94032OpenAlexW1487353416MaRDI QIDQ3084257

Andrey Bogdanov, Christian Rechberger

Publication date: 15 March 2011

Published in: Selected Areas in Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-19574-7_16




Related Items (32)

Conditional Differential Cryptanalysis of Trivium and KATANSome Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacksQuark: a lightweight hashAn All-In-One Approach to Differential Cryptanalysis for Small Block CiphersAll Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle ApproachMeet-in-the-Middle Technique for Integral Attacks against Feistel CiphersNew Attacks on Feistel Structures with Improved Memory ComplexitiesRefined cryptanalysis of the GPRS ciphers GEA-1 and GEA-2Bicliques with Minimal Data and Time Complexity for AESMeet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3Cryptanalysis of Round-Reduced $$\mathtt{LED}$$A Higher Order Key Partitioning Attack with Application to LBlockWhat is the effective key length for a block cipher: an attack on every practical block cipherMeet-in-the-middle preimage attacks on sponge-based hashingGeneralized MitM attacks on full TWINESuperposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashingMind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}Simplified MITM modeling for permutations: new (quantum) attacksAnalysis of \(3\)-line generalized Feistel networks with double SD-functionsA single-key attack on the full GOST block cipherA related key impossible differential attack against 22 rounds of the lightweight block cipher LBlockMultidimensional meet-in-the-middle attack and its applications to KATAN32/48/64An improved preimage attack against \texttt{HAVAL-3}Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINELBlock: A Lightweight Block CipherA Single-Key Attack on the Full GOST Block CipherBlock cipher invariants as eigenvectors of correlation matricesEvaluation and Cryptanalysis of the Pandaka Lightweight CipherCryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-2The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTISCryptanalysis of the Light-Weight Cipher A2U2


Uses Software


Cites Work


This page was built for publication: A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN