Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3
暂无分享,去创建一个
Amr M. Youssef | Riham AlTawy | Ahmed Abdelkhalek | Mohamed Tolba | Mohamed F. Tolba | A. Youssef | R. Altawy | A. Abdelkhalek
[1] Vincent Rijmen,et al. Obervations on Hierocrypt-3/L1 key scheduling algorithms , 2001 .
[2] Jérémy Jean,et al. Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting , 2013, IACR Cryptol. ePrint Arch..
[3] Yonglin Hao,et al. A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique , 2015, NSS.
[4] Whitfield Diffie,et al. Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard , 1977, Computer.
[5] Adi Shamir,et al. Improved Single-Key Attacks on 8-Round AES-192 and AES-256 , 2010, Journal of Cryptology.
[6] Amr M. Youssef,et al. Differential Sieving for 2-Step Matching Meet-in-the-Middle Attack with Application to LBlock , 2014, LightSec.
[7] Yu Sasaki,et al. Improved Preimage Attack for 68-Step HAS-160 , 2009, ICISC.
[8] Amr M. Youssef,et al. Preimage Attacks on Reduced-Round Stribog , 2014, AFRICACRYPT.
[9] Ali Aydin Selçuk,et al. A Meet-in-the-Middle Attack on 8-Round AES , 2008, FSE.
[10] Amr M. Youssef,et al. Meet in the Middle Attacks on Reduced Round Kuznyechik , 2015, IACR Cryptol. ePrint Arch..
[11] Hüseyin Demirci,et al. Improved Meet-in-the-Middle Attacks on AES , 2009, INDOCRYPT.
[12] Amr M. Youssef,et al. Second Preimage Analysis of Whirlwind , 2014, Inscrypt.
[13] Shuang Wu,et al. Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks , 2012, ASIACRYPT.
[14] Kenji Ohkuma,et al. The Block Cipher Hierocrypt , 2000, Selected Areas in Cryptography.
[15] Paulo S. L. M. Barreto,et al. Improved SQUARE Attacks against Reduced-Round HIEROCRYPT , 2001, FSE.
[16] Florian Mendel,et al. The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl , 2009, FSE.
[17] Vincent Rijmen,et al. The Block Cipher Square , 1997, FSE.
[18] Andrey Bogdanov,et al. A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN , 2010, IACR Cryptol. ePrint Arch..
[19] Andrey Bogdanov,et al. Biclique Cryptanalysis of the Full AES , 2011, ASIACRYPT.
[20] Anne Canteaut,et al. Sieve-in-the-Middle: Improved MITM Attacks (Full Version) , 2013, IACR Cryptol. ePrint Arch..