Results 1 to 10 of about 518,524 (183)
Meet-in-the-Middle Attacks on Reduced-Round Midori64
Midori is a lightweight block cipher designed by Banik et al. at ASIACRYPT 2015 to achieve low energy consumption. One version of Midori uses a 64-bit state, another uses a 128-bit state and we denote these versions Midori64 and Midori128.
Li Lin, Wenling Wu
doaj +3 more sources
Meet-in-the-middle attacks on FOX block cipher
The security of the block cipher FOX against meet-in-the-middle attack was analyzed.Firstly,3-round meet-in-the-middle distinguishers was constructed and 6-round meet-in-the-middle attacks for FOX64 and FOX128 was proposed.The two attacks were beter ...
IRong-jia L, INChen-hui J
doaj +3 more sources
Improved meet-in-the-middle attack on ARIA cipher
A study on the structure of ARIA cipher is presented. A new 4-round distinguishing property for the meet-in-the-middle attack on ARIA cipher is presented by making use of the multiset and the truncated differential char-acteristic. The new distinguishing
Man-man LI, Shao-zhen CHEN
doaj +3 more sources
Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes
Hashing modes are ways to convert a block cipher into a hash function, and those with AES as the underlying block cipher are referred to as AES hashing modes.
Zhenzhen Bao +4 more
doaj +5 more sources
Meet-in-the-middle attack on 11-round 3D cipher
A new 6-round meet-in-the-middle distinguisher was constructed by introducing multiset,making use of properties of the S-box was proposed and the truncated differential characteristic.Based on the distinguisher,a meet-in-the-middle attack on 11-round 3D ...
Jiong-jiong REN, Shao-zhen CHEN
doaj +3 more sources
Improved meet-in-the-middle attack on Joltik-BC-128
The Joltik-BC, adopting the substitution-permutation network structure and Tweakey framework, was a lightweight tweakable block cipher published at ASIACRPYPT 2014. By researching the internal characteristic of the Joltik-BC, a 6-round meet-in-the-middle
LI Zheng +3 more
doaj +1 more source
Quantum meet-in-the-middle attack on Feistel construction
18 pages, 3 ...
Xu, Yinsong, Yuan, Zheng
openaire +3 more sources
The parallel-cut meet-in-the-middle attack [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Nikolić, Ivica, Wang, Lei, Wu, Shuang
openaire +2 more sources
Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing
At EUROCRYPT 2006, Kelsey and Kohno proposed the so-called chosen target forced-prefix (CTFP) preimage attack, where for any challenge prefix P, the attacker can generate a suffix S such that H(P∥S) = y for some hash value y published in advance by the ...
Zhiyu Zhang +3 more
doaj +1 more source
Generalized Meet in the Middle Cryptanalysis of Block Ciphers With an Automated Search Algorithm
Meet in the middle (MITM) attack is one of the most important and applicable methods for cryptanalysis of block ciphers. In this paper, a more generalized method for MITM attack is considered.
Siavash Ahmadi, Mohammad Reza Aref
doaj +1 more source

