Automated meet-in-the-middle attack goes to Feistel
From MaRDI portal
Publication:6595820
DOI10.1007/978-981-99-8727-6_13zbMATH Open1546.94078MaRDI QIDQ6595820
Lingyue Qin, Guoyan Zhang, Qingliang Hou, Xiaoyun Wang, Xiaoyang Dong
Publication date: 30 August 2024
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Integer linear programming for three-subset meet-in-the-middle attacks: application to GIFT
- A single-key attack on the full GOST block cipher
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
- Cryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-2
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
- Refined cryptanalysis of the GPRS ciphers GEA-1 and GEA-2
- Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks
- Sieve-in-the-Middle: Improved MITM Attacks
- Preimage Attacks on Feistel-SP Functions: Impact of Omitting the Last Network Twist
- Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications
- New Preimage Attacks against Reduced SHA-1
- Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems
- Match Box Meet-in-the-Middle Attack Against KATAN
- Simpira v2: A Family of Efficient Permutations Using the AES Round Function
- Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- A Lightweight 256-Bit Hash Function for Hardware and Low-End Devices: Lesamnta-LW
- Biclique Cryptanalysis of the Full AES
- On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses
- Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE
- MD4 is Not One-Way
- Preimage Attacks on 3, 4, and 5-Pass HAVAL
- Finding Preimages in Full MD5 Faster Than Exhaustive Search
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
- Preimages for Step-Reduced SHA-2
- The Data Encryption Standard (DES) and its strength against attacks
- Attacking Triple Encryption
- (Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others
- Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks
- Automatic Search of Attacks on Round-Reduced AES and Applications
- Improved Meet-in-the-Middle Attacks on Reduced-Round DES
- A Practical Attack on KeeLoq
- Meet-in-the-middle preimage attacks on sponge-based hashing
- Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing
- Algebraic meet-in-the-middle attack on LowMC
- New attacks on LowMC instances with a single plaintext/ciphertext pair
- Simplified MITM modeling for permutations: new (quantum) attacks
Related Items (1)
This page was built for publication: Automated meet-in-the-middle attack goes to Feistel
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6595820)