Recent Advances in Meet-in-the-Middle Attacks

作者: Jian Guo

DOI:

关键词:

摘要:

参考文章(22)
Dmitry Khovratovich, Gaëtan Leurent, Christian Rechberger, Narrow-Bicliques: Cryptanalysis of Full IDEA Advances in Cryptology – EUROCRYPT 2012. ,vol. 7237, pp. 392- 410 ,(2012) , 10.1007/978-3-642-29011-4_24
Ji Li, Takanori Isobe, Kyoji Shibutani, Converting meet-in-the-middle preimage attack into pseudo collision attack: application to SHA-2 fast software encryption. pp. 264- 286 ,(2012) , 10.1007/978-3-642-34047-5_16
Dmitry Khovratovich, Bicliques for Permutations: Collision and Preimage Attacks in Stronger Settings Advances in Cryptology – ASIACRYPT 2012. pp. 544- 561 ,(2012) , 10.1007/978-3-642-34961-4_33
Andrey Bogdanov, Christian Rechberger, A 3-subset meet-in-the-middle attack: cryptanalysis of the lightweight block cipher KTANTAN international conference on selected areas in cryptography. ,vol. 6544, pp. 229- 240 ,(2010) , 10.1007/978-3-642-19574-7_16
Gaëtan Leurent, MD4 is Not One-Way fast software encryption. pp. 412- 428 ,(2008) , 10.1007/978-3-540-71039-4_26
Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger, Biclique cryptanalysis of the full AES international conference on the theory and application of cryptology and information security. ,vol. 7073, pp. 344- 371 ,(2011) , 10.1007/978-3-642-25385-0_19
Jan-Hendrik Evertse, David Chaum, Crytanalysis of DES with a Reduced Number of Rounds: Sequences of Linear Factors in Block Ciphers international cryptology conference. pp. 192- 211 ,(1985)
Jian Guo, San Ling, Christian Rechberger, Huaxiong Wang, Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 international conference on the theory and application of cryptology and information security. ,vol. 6477, pp. 56- 75 ,(2010) , 10.1007/978-3-642-17373-8_4