Results 141 to 150 of about 518,524 (183)
Some of the next articles are maybe not open access.
A meet-in-the-middle attack on reduced-round ARIA
Journal of Systems and Software, 2011Abstract: In this paper, the meet-in-the-middle attack against block cipher ARIA is presented for the first time. Some new 3-round and 4-round distinguishing properties of ARIA are found. Based on the 3-round distinguishing property, we can apply the meet-in-the-middle attack with up to 6 rounds for all versions of ARIA.
Xuehai Tang +4 more
openaire +3 more sources
Meet-in-the-middle attacks on 10-round AES-256
Designs, Codes and Cryptography, 2015zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Li, Rongjia, Jin, Chenhui
openaire +3 more sources
Meet-in-the-Middle Attacks on Reduced Round Piccolo
Science China Information Sciences, 2016Piccolo is a lightweight block cipher designed by Sony Corporation and published in CHES 2011. It inherits the Generalized Feistel Network GFN structure and operates on a 64-bit state. It has two versions; Piccolo-80 and Piccolo-128 with 80-bit and 128-bit keys, respectively.
Mohamed Tolba +2 more
openaire +1 more source
Side-Channel Attack Using Meet-in-the-Middle Technique
The Computer Journal, 2009In this paper, we introduce a new side-channel attack using block cipher cryptanalysis named a meet-in-the-middle attack. Using our new side-channel technique we show that advanced encryption standard (AES) with reduced 10 masked rounds is broken, which is faster than the exhaustive key search attack. This implies that one has to mask the entire rounds
J. Kim, S. Hong
openaire +1 more source
Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks
2021At EUROCRYPT 2021, Bao et al. proposed an automatic method for systematically exploring the configuration space of meet-in-the-middle (MITM) preimage attacks. We further extend it into a constraint-based framework for finding exploitable MITM characteristics in the context of key-recovery and collision attacks by taking the subtle peculiarities of both
Xiaoyang Dong +5 more
openaire +1 more source
Meet-in-the-middle attack on digital signature schemes
2006The meet-in-the-middle attack can be used for forging signatures on mixed-type digital signature schemes, and takes less time than an exhaustive attack. This paper formulates a meet-in-the-middle attack on mixed-type digital signature schemes, shows the necessary conditions for success, and discusses the relationships between computational and space ...
Kazuo Ohta, Kenji Koyama
openaire +1 more source
Meet-in-the-Middle Attacks on Round-Reduced Khudra
2015Khudra is a hardware-oriented lightweight block cipher that is designed to run efficiently on Field Programmable Gate Arrays. It employs an 18-rounds Generalized type-2 Feistel Structure with a 64-bit block length and an 80-bit key. In this paper, we present Meet-in-the-Middle MitM attacks on 13 and 14 round-reduced Khudra.
Mohamed Tolba +2 more
openaire +1 more source
Differential Fault Attack and Meet-in-the-Middle Attack on Block Cipher LED
Advanced Materials Research, 2013In this paper, on the basis of the nibble-based faulty model and the differential analysis principle, we propose a kind of attack on the new low-cost LED block cipher which combine differential fault attack with meet-in-the-middle attack. We inject the nibble faulty at round 29, which is earlier than other papers.
Feng Liu, Xuan Liu, Shuai Meng
openaire +1 more source
Extended meet-in-the-middle attacks on some Feistel constructions
Designs, Codes and Cryptography, 2015zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Guo, Jian +3 more
openaire +1 more source
A meet-in-the-middle attack on the LBlock cipher
IEEE Conference Anthology, 2013LBlock is a new lightweight Block cipher which was proposed by Wu and Zhang at ACNS2011. The block size of LBlock is 64 bits and its key size is 80 bits. It was reported that the cipher is very suitable for many resource constrained environments (for instance RFID and sensor networking) which usually have weak computation ability, strict power ...
Yongzhuang Wei +2 more
openaire +1 more source

