Results 1 to 10 of about 518,524 (183)

Meet-in-the-Middle Attacks on Reduced-Round Midori64

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Midori is a lightweight block cipher designed by Banik et al. at ASIACRYPT 2015 to achieve low energy consumption. One version of Midori uses a 64-bit state, another uses a 128-bit state and we denote these versions Midori64 and Midori128.
Li Lin, Wenling Wu
doaj   +3 more sources

Meet-in-the-middle attacks on FOX block cipher

open access: yesTongxin xuebao, 2016
The security of the block cipher FOX against meet-in-the-middle attack was analyzed.Firstly,3-round meet-in-the-middle distinguishers was constructed and 6-round meet-in-the-middle attacks for FOX64 and FOX128 was proposed.The two attacks were beter ...
IRong-jia L, INChen-hui J
doaj   +3 more sources

Improved meet-in-the-middle attack on ARIA cipher

open access: yesTongxin xuebao, 2015
A study on the structure of ARIA cipher is presented. A new 4-round distinguishing property for the meet-in-the-middle attack on ARIA cipher is presented by making use of the multiset and the truncated differential char-acteristic. The new distinguishing
Man-man LI, Shao-zhen CHEN
doaj   +3 more sources

Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes

open access: yesIACR Transactions on Symmetric Cryptology, 2020
Hashing modes are ways to convert a block cipher into a hash function, and those with AES as the underlying block cipher are referred to as AES hashing modes.
Zhenzhen Bao   +4 more
doaj   +5 more sources

Meet-in-the-middle attack on 11-round 3D cipher

open access: yesTongxin xuebao, 2015
A new 6-round meet-in-the-middle distinguisher was constructed by introducing multiset,making use of properties of the S-box was proposed and the truncated differential characteristic.Based on the distinguisher,a meet-in-the-middle attack on 11-round 3D ...
Jiong-jiong REN, Shao-zhen CHEN
doaj   +3 more sources

Improved meet-in-the-middle attack on Joltik-BC-128

open access: yes网络与信息安全学报
The Joltik-BC, adopting the substitution-permutation network structure and Tweakey framework, was a lightweight tweakable block cipher published at ASIACRPYPT 2014. By researching the internal characteristic of the Joltik-BC, a 6-round meet-in-the-middle
LI Zheng   +3 more
doaj   +1 more source

Quantum meet-in-the-middle attack on Feistel construction

open access: yesQuantum Information Processing, 2023
18 pages, 3 ...
Xu, Yinsong, Yuan, Zheng
openaire   +3 more sources

The parallel-cut meet-in-the-middle attack [PDF]

open access: yesCryptography and Communications, 2014
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Nikolić, Ivica, Wang, Lei, Wu, Shuang
openaire   +2 more sources

Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing

open access: yesIACR Transactions on Symmetric Cryptology, 2023
At EUROCRYPT 2006, Kelsey and Kohno proposed the so-called chosen target forced-prefix (CTFP) preimage attack, where for any challenge prefix P, the attacker can generate a suffix S such that H(P∥S) = y for some hash value y published in advance by the ...
Zhiyu Zhang   +3 more
doaj   +1 more source

Generalized Meet in the Middle Cryptanalysis of Block Ciphers With an Automated Search Algorithm

open access: yesIEEE Access, 2020
Meet in the middle (MITM) attack is one of the most important and applicable methods for cryptanalysis of block ciphers. In this paper, a more generalized method for MITM attack is considered.
Siavash Ahmadi, Mohammad Reza Aref
doaj   +1 more source

Home - About - Disclaimer - Privacy