Meet-in-the-middle attack

Results: 9



#Item
1Lattice-based cryptography / Post-quantum cryptography / NTRU / NTRUEncrypt

Submitted exclusively to the London Mathematical Society doi:Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key Christine van Vredendaal

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-02-22 01:46:08
2

A Meet-in-the-Middle Attack on 8-Round AES H¨ useyin Demirci1 and Ali Aydın Sel¸cuk2 1 T¨

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2010-07-23 02:28:36
    3Boomerang attack / Advantage / Ciphertext / Meet-in-the-middle attack / Stream cipher / Chosen-plaintext attack / Advanced Encryption Standard / Cryptanalysis / Block cipher / Cryptography / Tiny Encryption Algorithm / University of Cambridge Computer Laboratory

    Security Analysis of PRINCE J´er´emy Jean1? , Ivica Nikoli´c2 , Thomas Peyrin2 , Lei Wang2 and Shuang Wu2 ´ Ecole Normale Sup´erieure, France Division of Mathematical Sciences, School of Physical and Mathematical Sc

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-04-22 23:59:39
    4Ciphertext / Triple DES / Advanced Encryption Standard / Cipher / Stream cipher / RC4 / Meet-in-the-middle attack / Block size / ICE / Cryptography / Data Encryption Standard / Block cipher

    Lecture 9: Using Block and Stream Ciphers for Secure Wired and WiFi Communications Lecture Notes on “Computer and Network Security” by Avi Kak () March 8, 2015 4:01pm

    Add to Reading List

    Source URL: engineering.purdue.edu

    Language: English - Date: 2015-03-08 16:07:20
    5University of Cambridge Computer Laboratory / Key schedule / Linear cryptanalysis / Block cipher / Grain / ICE / Advanced Encryption Standard / Cipher / Churning / Cryptography / Stream ciphers / Tiny Encryption Algorithm

    A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN Andrey Bogdanov and Christian Rechberger Katholieke Universiteit Leuven, ESAT/COSIC and IBBT, Belgium [removed]u

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2011-02-14 05:03:01
    6XTEA / Weak key / Key schedule / Feistel cipher / Ciphertext / Advanced Encryption Standard / Block cipher / Chosen-plaintext attack / Cryptanalysis / Cryptography / Tiny Encryption Algorithm / University of Cambridge Computer Laboratory

    Meet-in-the-Middle Attacks on Reduced-Round XTEA⋆ Gautham Sekar⋆⋆ , Nicky Mouha⋆ ⋆ ⋆ , Vesselin Velichkov† , and Bart Preneel

    Add to Reading List

    Source URL: www.cosic.esat.kuleuven.be

    Language: English
    7Cipher / Meet-in-the-middle attack / Key size / Triple DES / RSA / Block cipher / Cryptanalysis / Multiple encryption / Rabin cryptosystem / Cryptography / Public-key cryptography / Data Encryption Standard

    PDF Document

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2012-04-20 06:17:58
    8Man-in-the-middle attack / Key size / Brute-force attack / VEST / Block cipher / Cipher / Advanced Encryption Standard / Meet-in-the-middle attack / Key schedule / Cryptography / Stream ciphers / Cryptographic hash functions

    PDF Document

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2013-02-07 00:29:28
    9Triple DES / Ciphertext / Cipher / Chosen-plaintext attack / Network Security & Cryptography / Cryptography / Data Encryption Standard / Meet-in-the-middle attack

    PDF Document

    Add to Reading List

    Source URL: stephanemoore.com

    Language: English - Date: 2012-12-15 17:40:40
    UPDATE