Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework
From MaRDI portal
Publication:6048704
DOI10.1007/s10623-023-01226-4zbMath1520.94070MaRDI QIDQ6048704
Bin Hu, Tairong Shi, Jie Guan, Lei Wang, Unnamed Author, Sen Peng Wang, Xuejia Lai
Publication date: 7 September 2023
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Cites Work
- Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64
- Revised version of block cipher CHAM
- WARP: revisiting GFN for lightweight 128-bit block cipher
- A unified method for finding impossible differentials of block cipher structures
- Impossible differential cryptanalysis using matrix method
- Programming the Demirci-Selçuk meet-in-the-middle attack with constraints
- Integer linear programming for three-subset meet-in-the-middle attacks: application to GIFT
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
- Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard
- An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums
- Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey
- Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks
- Sieve-in-the-Middle: Improved MITM Attacks
- Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT
- Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers
- Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES
- Match Box Meet-in-the-Middle Attack Against KATAN
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers
- Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster)
- Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
- General Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher
- Powers of tensors and fast matrix multiplication
- Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers
- HIGHT: A New Block Cipher Suitable for Low-Resource Device
- A Meet-in-the-Middle Attack on 8-Round AES
- Finding Preimages in Full MD5 Faster Than Exhaustive Search
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck
- Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming
- Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family
- Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
- New Impossible Differential Search Tool from Design and Cryptanalysis Aspects
- Progress in Cryptology - INDOCRYPT 2003
- Rotational-XOR Differential Cryptanalysis and an Automatic Framework for AND-RX Ciphers
This page was built for publication: Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework