Improved Meet-in-the-Middle Attacks on Reduced-Round Kiasu-BC and Joltik-BC
暂无分享,去创建一个
Wei Li | Dawu Gu | Yifan Shi | Ya Liu | Yang Bao | Fengyu Zhao | Zhiqiang Liu | Zhiqiang Zeng | Wei Li | Dawu Gu | Zhiqiang Liu | Ya Liu | Zhiqiang Zeng | Yifan Shi | Fengyu Zhao | Yang Bao
[1] Ali Aydin Selçuk,et al. A Meet-in-the-Middle Attack on 8-Round AES , 2008, FSE.
[2] Chenhui Jin,et al. Meet-in-the-middle attacks on 10-round AES-256 , 2016, Des. Codes Cryptogr..
[3] Thomas Peyrin,et al. Tweaks and Keys for Block Ciphers: The TWEAKEY Framework , 2014, ASIACRYPT.
[4] Yu Sasaki,et al. Finding Preimages in Full MD5 Faster Than Exhaustive Search , 2009, EUROCRYPT.
[5] Kazuhiko Minematsu,et al. Building blockcipher from small-block tweakable blockcipher , 2015, Des. Codes Cryptogr..
[6] Phillip Rogaway,et al. The Software Performance of Authenticated-Encryption Modes , 2011, FSE.
[7] Xiaoyang Dong,et al. MILP-Aided Related-Tweak/Key Impossible Differential Attack and its Applications to QARMA, Joltik-BC , 2019, IEEE Access.
[8] Adi Shamir,et al. Improved Single-Key Attacks on 8-Round AES-192 and AES-256 , 2010, Journal of Cryptology.
[9] David A. Wagner,et al. Tweakable Block Ciphers , 2002, CRYPTO.
[10] Joltik , 2020, Proceedings of the 26th Annual International Conference on Mobile Computing and Networking.
[11] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[12] Yu Sasaki,et al. Meet-in-the-Middle Attacks on Generic Feistel Constructions , 2014, ASIACRYPT.
[13] Amr M. Youssef,et al. A Meet in the Middle Attack on Reduced Round Kiasu-BC , 2016, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[14] Yu Sasaki,et al. Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions , 2017, IACR Trans. Symmetric Cryptol..
[15] Yu Sasaki,et al. Extended meet-in-the-middle attacks on some Feistel constructions , 2015, Designs, Codes and Cryptography.
[16] Jérémy Jean,et al. Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting , 2013, IACR Cryptol. ePrint Arch..
[17] Yu Sasaki,et al. Preimage Attacks on One-Block MD4, 63-Step MD5 and More , 2009, Selected Areas in Cryptography.
[18] Thomas Peyrin,et al. Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers , 2016, CRYPTO.