Generalized MitM attacks on full TWINE
暂无分享,去创建一个
[1] Jongsung Kim,et al. HIGHT: A New Block Cipher Suitable for Low-Resource Device , 2006, CHES.
[2] Kazuhiko Minematsu,et al. $\textnormal{\textsc{TWINE}}$ : A Lightweight Block Cipher for Multiple Platforms , 2012, Selected Areas in Cryptography.
[3] Ferhat Karakoç,et al. Multidimensional Meet-in-the-Middle Attacks on Reduced-Round TWINE-128 , 2013, LightSec.
[4] Christophe De Cannière,et al. KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers , 2009, CHES.
[5] Alex Biryukov,et al. Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE , 2015, FSE.
[6] Hongjun Wu,et al. Improving the Biclique Cryptanalysis of AES , 2015, ACISP.
[7] Ferhat Karakoç,et al. Biclique Cryptanalysis of TWINE , 2012, CANS.
[8] T. Suzaki,et al. TWINE : A Lightweight , Versatile Block Cipher , 2011 .
[9] Andrey Bogdanov,et al. Note of Multidimensional MITM Attack on 25-Round TWINE-128 , 2014, IACR Cryptol. ePrint Arch..
[10] Andrey Bogdanov,et al. A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN , 2010, IACR Cryptol. ePrint Arch..
[11] A. Emre Harmanci,et al. Biclique cryptanalysis of LBlock and TWINE , 2013, Inf. Process. Lett..
[12] Christian Rechberger,et al. On Bruteforce-Like Cryptanalysis: New Meet-in-the-Middle Attacks in Symmetric Cryptanalysis , 2012, ICISC.
[13] Andrey Bogdanov,et al. Biclique Cryptanalysis of the Full AES , 2011, ASIACRYPT.
[14] Yu Sasaki,et al. Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1 , 2009, CRYPTO.
[15] Andrey Bogdanov,et al. PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.
[16] Whitfield Diffie,et al. Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard , 1977, Computer.
[17] María Naya-Plasencia,et al. Block Ciphers That Are Easier to Mask: How Far Can We Go? , 2013, CHES.
[18] Andrey Bogdanov,et al. Bicliques with Minimal Data and Time Complexity for AES , 2014, ICISC.