|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 97 occurrences of 50 keywords
|
|
|
Results
Found 243 publication records. Showing 243 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
23 | Akinori Hosoyamada, Yu Sasaki |
Quantum Demiric-Selçuk Meet-in-the-Middle Attacks: Applications to 6-Round Generic Feistel Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 11th International Conference, SCN 2018, Amalfi, Italy, September 5-7, 2018, Proceedings, pp. 386-403, 2018, Springer, 978-3-319-98112-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Rongjia Li, Chenhui Jin |
Improved meet-in-the-middle attacks on Crypton and mCrypton. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 11(2), pp. 97-103, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Andreas Björklund, Petteri Kaski, Lukasz Kowalik |
Counting Thin Subgraphs via Packings Faster than Meet-in-the-Middle Time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Algorithms ![In: ACM Trans. Algorithms 13(4), pp. 48:1-48:26, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Robert C. Holte, Ariel Felner, Guni Sharon, Nathan R. Sturtevant, Jingwei Chen |
MM: A bidirectional search algorithm that is guaranteed to meet in the middle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artif. Intell. ![In: Artif. Intell. 252, pp. 232-266, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Jingyi Cui, Jiansheng Guo, Yanyan Huang, Yipeng Liu |
Improved Meet-in-the-Middle Attacks on Crypton and mCrypton. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KSII Trans. Internet Inf. Syst. ![In: KSII Trans. Internet Inf. Syst. 11(5), pp. 2660-2679, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Rongjia Li, Chenhui Jin |
Meet-in-the-Middle Attack on 11-Round 3D Block Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Found. Comput. Sci. ![In: Int. J. Found. Comput. Sci. 28(1), pp. 19-28, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Akinori Hosoyamada, Yu Sasaki |
Quantum Meet-in-the-Middle Attacks: Applications to Generic Feistel Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 1229, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
23 | Le Dong, Yongxia Mao |
Meet-in-the-Middle Attacks on 3-Line Generalized Feistel Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 1071, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
23 | Li Lin 0003, Wenling Wu |
Meet-in-the-Middle Attacks on Reduced-Round Midori64. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Symmetric Cryptol. ![In: IACR Trans. Symmetric Cryptol. 2017(1), pp. 215-239, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Yuanhao Deng, Chenhui Jin, Rongjia Li |
Meet in the Middle Attack on Type-1 Feistel Construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology - 13th International Conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected Papers, pp. 427-444, 2017, Springer, 978-3-319-75159-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Mohamed Tolba, Amr M. Youssef |
Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers, pp. 26-38, 2017, Springer, 978-3-319-78555-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Christine van Vredendaal |
Reduced memory meet-in-the-middle attack against the NTRU private key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LMS J. Comput. Math. ![In: LMS J. Comput. Math. 19(A), pp. 43-57, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Riham AlTawy, Ahmed Abdelkhalek 0001, Amr M. Youssef |
A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Inf. Syst. ![In: IEICE Trans. Inf. Syst. 99-D(4), pp. 1246-1250, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Mohamed Tolba, Ahmed Abdelkhalek 0001, Amr M. Youssef |
A Meet in the Middle Attack on Reduced Round Kiasu-BC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(10), pp. 1888-1890, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Lukasz Kowalik, Arkadiusz Socala |
Assigning Channels Via the Meet-in-the-Middle Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Algorithmica ![In: Algorithmica 74(4), pp. 1435-1452, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Rongjia Li, Chenhui Jin |
Meet-in-the-middle attacks on 10-round AES-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 80(3), pp. 459-471, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Jian Guo 0001, Jérémy Jean, Ivica Nikolic, Yu Sasaki |
Extended meet-in-the-middle attacks on some Feistel constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 80(3), pp. 587-618, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Johannes Buchmann 0001, Florian Göpfert, Rachel Player, Thomas Wunderer |
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 89, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
23 | Rui Zong, Xiaoyang Dong |
Meet-in-the-Middle Attack on QARMA Block Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 1160, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
23 | Christine van Vredendaal |
Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 177, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
23 | Li Lin 0003, Wenling Wu |
Improved Meet-in-the-Middle Attacks on Reduced-Round Kalyna-128/256 and Kalyna-256/512. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 722, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
23 | Yonglin Hao |
Improved Meet-in-the-Middle Attacks on Round-Reduced Crypton-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 267, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
23 | Patrick Derbez, Pierre-Alain Fouque |
Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 579, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
23 | Ivica Nikolic, Yu Sasaki |
A New Algorithm for the Unbalanced Meet-in-the-Middle Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 851, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
23 | Shahram Rasoolzadeh, Håvard Raddum |
Multidimensional Meet in the Middle Cryptanalysis of KATAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 77, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
23 | Jian Guo 0001, Jérémy Jean, Ivica Nikolic, Yu Sasaki |
Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 1162, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
23 | Jian Guo 0001, Jérémy Jean, Ivica Nikolic, Yu Sasaki |
Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Symmetric Cryptol. ![In: IACR Trans. Symmetric Cryptol. 2016(2), pp. 307-337, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Ivica Nikolic, Yu Sasaki |
A New Algorithm for the Unbalanced Meet-in-the-Middle Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (1) ![In: Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I, pp. 627-647, 2016, 978-3-662-53886-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Robert C. Holte, Ariel Felner, Guni Sharon, Nathan R. Sturtevant |
Bidirectional Search That Is Guaranteed to Meet in the Middle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI ![In: Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, February 12-17, 2016, Phoenix, Arizona, USA., pp. 3411-3417, 2016, AAAI Press, 978-1-57735-760-5. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Qianqian Yang 0003, Lei Hu, Siwei Sun, Ling Song 0001 |
Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Network and System Security - 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings, pp. 398-411, 2016, Springer, 978-3-319-46297-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Johannes Buchmann 0001, Florian Göpfert, Rachel Player, Thomas Wunderer |
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2016 - 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings, pp. 24-43, 2016, Springer, 978-3-319-31516-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Patrick Derbez, Pierre-Alain Fouque |
Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (2) ![In: Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II, pp. 157-184, 2016, Springer, 978-3-662-53007-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Ivica Nikolic, Lei Wang 0031, Shuang Wu |
The parallel-cut meet-in-the-middle attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptogr. Commun. ![In: Cryptogr. Commun. 7(3), pp. 331-345, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Riham AlTawy, Amr M. Youssef |
A Meet in the Middle Attack on Reduced Round Kuznyechik. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(10), pp. 2194-2198, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Zhiqiang Liu 0001, Ya Liu 0001, Qingju Wang 0001, Dawu Gu, Wei Li 0013 |
Meet-in-the-middle fault analysis on word-oriented substitution-permutation network block ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 8(4), pp. 672-681, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Alex Biryukov, Patrick Derbez, Léo Perrin |
Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 240, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
23 | Patrick Derbez, Pierre-Alain Fouque |
Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks against Reduced-Round AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 259, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
23 | Thomas Espitau, Pierre-Alain Fouque, Pierre Karpman |
Higher-Order Differential Meet-in-The-Middle Preimage Attacks on SHA-1 and BLAKE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 515, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
23 | Riham AlTawy, Amr M. Youssef |
Meet in the Middle Attacks on Reduced Round Kuznyechik. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 96, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
23 | Li Lin 0003, Wenling Wu |
Improved Meet-in-the-Middle Distinguisher on Feistel Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 51, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
23 | Li Lin 0003, Wenling Wu |
Meet-in-the-Middle Attacks on Reduced-Round Midori-64. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 1165, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
23 | Riham AlTawy, Ahmed Abdelkhalek 0001, Amr M. Youssef |
A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 762, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
23 | Patrick Derbez, Léo Perrin |
Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 239, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
23 | Yongguang Li, Guang Zeng, Wenbao Han |
缩减轮数Crypton算法中间相遇攻击的改进 (Improved Meet-in-the-middle Attack on Reduced-round Crypton Cipher). ![Search on Bibsonomy](Pics/bibsonomy.png) |
计算机科学 ![In: 计算机科学 42(11), pp. 217-221, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Li Lin 0003, Wenling Wu, Yafei Zheng |
Improved Meet-in-the-Middle Distinguisher on Feistel Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers, pp. 122-142, 2015, Springer, 978-3-319-31300-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Mohamed Tolba, Ahmed Abdelkhalek 0001, Amr M. Youssef |
Meet-in-the-Middle Attacks on Reduced Round Piccolo. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LightSec ![In: Lightweight Cryptography for Security and Privacy - 4th International Workshop, LightSec 2015, Bochum, Germany, September 10-11, 2015, Revised Selected Papers, pp. 3-20, 2015, Springer, 978-3-319-29077-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Mohamed Tolba, Ahmed Abdelkhalek 0001, Amr M. Youssef |
Meet-in-the-Middle Attacks on Round-Reduced Khudra. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPACE ![In: Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings, pp. 127-138, 2015, Springer, 978-3-319-24125-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Ahmed Abdelkhalek 0001, Riham AlTawy, Mohamed Tolba, Amr M. Youssef |
Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LATINCRYPT ![In: Progress in Cryptology - LATINCRYPT 2015 - 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings, pp. 187-203, 2015, Springer, 978-3-319-22173-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Leibo Li, Keting Jia, Xiaoyun Wang 0001, Xiaoyang Dong |
Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers, pp. 48-70, 2015, Springer, 978-3-662-48115-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Alex Biryukov, Patrick Derbez, Léo Perrin |
Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers, pp. 3-27, 2015, Springer, 978-3-662-48115-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Patrick Derbez, Léo Perrin |
Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers, pp. 190-216, 2015, Springer, 978-3-662-48115-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya |
Improved Meet-in-the-Middle Attacks on 7 and 8-Round ARIA-192 and ARIA-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2015 - 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings, pp. 198-217, 2015, Springer, 978-3-319-26616-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Thomas Espitau, Pierre-Alain Fouque, Pierre Karpman |
Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (1) ![In: Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I, pp. 683-701, 2015, Springer, 978-3-662-47988-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Bo Zhu 0007, Guang Gong |
Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptogr. Commun. ![In: Cryptogr. Commun. 6(4), pp. 313-333, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Jukka Kohonen |
A Meet-in-the-Middle Algorithm for Finding Extremal Restricted Additive 2-Bases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Integer Seq. ![In: J. Integer Seq. 17(6), pp. 14.6.8, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
23 | Jiqiang Lu, Yongzhuang Wei, Jongsung Kim, Enes Pasalic |
The higher-order meet-in-the-middle attack and its application to the Camellia block cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Theor. Comput. Sci. ![In: Theor. Comput. Sci. 527, pp. 102-122, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Lukasz Kowalik, Arkadiusz Socala |
Assigning channels via the meet-in-the-middle approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1407.7161, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
23 | Shenghui Su, Tao Xie, Shuwang Lü |
A New Non-MDS Hash Function Resisting Birthday Attack and Meet-in-the-middle Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1408.5999, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
23 | Leibo Li, Keting Jia |
Improved Meet-in-the-Middle Attacks on Reduced-Round Camellia-192/256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2014, pp. 292, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
23 | Andreas Björklund, Petteri Kaski, Lukasz Kowalik |
Counting Thin Subgraphs via Packings Faster Than Meet-in-the-Middle Time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SODA ![In: Proceedings of the Twenty-Fifth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2014, Portland, Oregon, USA, January 5-7, 2014, pp. 594-603, 2014, SIAM, 978-1-61197-338-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Ling Song 0001, Lei Hu, Bingke Ma, Danping Shi |
Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LightSec ![In: Lightweight Cryptography for Security and Privacy - Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers, pp. 140-151, 2014, Springer, 978-3-319-16362-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Riham AlTawy, Amr M. Youssef |
Differential Sieving for 2-Step Matching Meet-in-the-Middle Attack with Application to LBlock. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LightSec ![In: Lightweight Cryptography for Security and Privacy - Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers, pp. 126-139, 2014, Springer, 978-3-319-16362-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Yu Sasaki |
Memoryless Unbalanced Meet-in-the-Middle Attacks: Impossible Results and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security - 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings, pp. 253-270, 2014, Springer, 978-3-319-07535-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Jian Guo 0001, Jérémy Jean, Ivica Nikolic, Yu Sasaki |
Meet-in-the-Middle Attacks on Generic Feistel Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (1) ![In: Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I, pp. 458-477, 2014, Springer, 978-3-662-45610-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Yonglin Hao, Dongxia Bai, Leibo Li |
A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Network and System Security - 8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014, Proceedings, pp. 166-183, 2014, Springer, 978-3-319-11697-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Thomas Fuhr 0001, Brice Minaud |
Match Box Meet-in-the-Middle Attack Against KATAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption - 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers, pp. 61-81, 2014, Springer, 978-3-662-46705-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Lukasz Kowalik, Arkadiusz Socala |
Assigning Channels via the Meet-in-the-Middle Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWAT ![In: Algorithm Theory - SWAT 2014 - 14th Scandinavian Symposium and Workshops, Copenhagen, Denmark, July 2-4, 2014. Proceedings, pp. 282-293, 2014, Springer, 978-3-319-08403-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Yu Sasaki |
Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1), pp. 121-130, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Matthew Amy, Dmitri Maslov, Michele Mosca, Martin Roetteler |
A Meet-in-the-Middle Algorithm for Fast Synthesis of Depth-Optimal Quantum Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. ![In: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 32(6), pp. 818-830, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Andreas Björklund, Petteri Kaski, Lukasz Kowalik |
Counting thin subgraphs via packings faster than meet-in-the-middle time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1306.4111, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
23 | Pierre-Alain Fouque, Pierre Karpman |
Security Amplification against Meet-in-the-Middle Attacks Using Whitening. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2013, pp. 618, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
23 | Shenghui Su, Tao Xie, Shuwang Lü |
A Lightweight Hash Function Resisting Birthday Attack and Meet-in-the-middle Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2013, pp. 327, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
23 | Ivica Nikolic, Lei Wang 0031, Shuang Wu |
The Parallel-Cut Meet-In-The-Middle Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2013, pp. 530, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
23 | Yonglin Hao, Dongxia Bai |
A Meet-in-the-middle Attack on Round-Reduced mCrypton. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2013, pp. 756, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
23 | Leibo Li, Keting Jia, Xiaoyun Wang 0001 |
Improved Meet-in-the-Middle Attacks on AES-192 and PRINCE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2013, pp. 573, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
23 | Özkan Boztas, Ferhat Karakoç, Mustafa Çoban |
Multidimensional Meet-in-the-Middle Attacks on Reduced-Round TWINE-128. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LightSec ![In: Lightweight Cryptography for Security and Privacy - Second International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers, pp. 55-67, 2013, Springer, 978-3-642-40391-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Yu Sasaki, Wataru Komatsubara, Yasuhide Sakai, Lei Wang 0031, Mitsugu Iwamoto, Kazuo Sakiyama, Kazuo Ohta |
Meet-in-the-Middle Preimage Attacks Revisited - New Results on MD5 and HAVAL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: SECRYPT 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjavík, Iceland, 29-31 July, 2013, pp. 111-122, 2013, SciTePress, 978-989-8565-73-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
23 | Dongxia Bai, Hongbo Yu |
Improved Meet-in-the-Middle Attacks on Round-Reduced ARIA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 16th International Conference, ISC 2013, Dallas, Texas, USA, November 13-15, 2013, Proceedings, pp. 155-168, 2013, Springer, 978-3-319-27658-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Patrick Derbez, Pierre-Alain Fouque |
Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption - 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers, pp. 541-560, 2013, Springer, 978-3-662-43932-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Li Lin 0003, Wenling Wu, Yanfeng Wang, Lei Zhang 0012 |
General Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2013 - 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers, pp. 203-223, 2013, Springer, 978-3-319-12159-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Pierre-Alain Fouque, Pierre Karpman |
Security Amplification against Meet-in-the-Middle Attacks Using Whitening. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding - 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings, pp. 252-269, 2013, Springer, 978-3-642-45238-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Patrick Derbez |
Meet-in-the-Middle Attacks on AES. (Attaques par Rencontre par le Milieu sur l'AES). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2013 |
RDF |
|
23 | Dukjae Moon, Deukjo Hong, Daesung Kwon, Seokhie Hong |
Meet-in-the-Middle Preimage Attacks on Hash Modes of Generalized Feistel and Misty Schemes with SP Round Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(8), pp. 1379-1389, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
23 | Lei Wang 0031, Yu Sasaki, Wataru Komatsubara, Kazuo Sakiyama, Kazuo Ohta |
Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions RIPEMD and RIPEMD-128. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1), pp. 100-110, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
23 | Jung Hee Cheon, Jeongdae Hong, Gene Tsudik |
Reducing RFID reader load with the meet-in-the-middle strategy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Commun. Networks ![In: J. Commun. Networks 14(1), pp. 10-14, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
23 | Matthew Amy, Dmitri Maslov, Michele Mosca, Martin Roetteler |
A meet-in-the-middle algorithm for fast synthesis of depth-optimal quantum circuits ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1206.0758, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
23 | Yu Sasaki, Lei Wang 0031 |
Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers, pp. 234-251, 2012, Springer, 978-3-642-35998-9. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
23 | Takanori Isobe 0001, Kyoji Shibutani |
All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers, pp. 202-221, 2012, Springer, 978-3-642-35998-9. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
23 | Ji Li, Takanori Isobe 0001, Kyoji Shibutani |
Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers, pp. 264-286, 2012, Springer, 978-3-642-34046-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
23 | Christian Rechberger |
On Bruteforce-Like Cryptanalysis: New Meet-in-the-Middle Attacks in Symmetric Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers, pp. 33-36, 2012, Springer, 978-3-642-37681-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
23 | Jiqiang Lu, Yongzhuang Wei, Enes Pasalic, Pierre-Alain Fouque |
Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings, pp. 197-215, 2012, Springer, 978-3-642-34116-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
23 | Jiqiang Lu, Yongzhuang Wei, Jongsung Kim, Enes Pasalic |
The Higher-Order Meet-in-the-Middle Attack and Its Application to the Camellia Block Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings, pp. 244-264, 2012, Springer, 978-3-642-34930-0. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
23 | Yu Sasaki, Lei Wang 0031, Yasuhide Sakai, Kazuo Sakiyama, Kazuo Ohta |
Three-Subset Meet-in-the-Middle Attack on Reduced XTEA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2012 - 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings, pp. 138-154, 2012, Springer, 978-3-642-31409-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
23 | Alex Biryukov |
Meet-in-the-Middle Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 772-773, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
23 | Bo Zhu 0007, Guang Gong |
Guess-then-Meet-in-the-Middle Attacks on the KTANTAN Family of Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2011, pp. 619, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
23 | Lei Wei 0001, Christian Rechberger, Jian Guo 0001, Hongjun Wu 0001, Huaxiong Wang, San Ling |
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2011, pp. 201, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
23 | Keting Jia, Hongbo Yu, Xiaoyun Wang 0001 |
A Meet-in-the-Middle Attack on the Full KASUMI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2011, pp. 466, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
23 | Xuehai Tang, Bing Sun 0001, Ruilin Li, Chao Li 0002, Juhua Yin |
A meet-in-the-middle attack on reduced-round ARIA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Softw. ![In: J. Syst. Softw. 84(10), pp. 1685-1692, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
23 | Yu Sasaki |
Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption - 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers, pp. 378-396, 2011, Springer, 978-3-642-21701-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
23 | Lei Wei 0001, Christian Rechberger, Jian Guo 0001, Hongjun Wu 0001, Huaxiong Wang, San Ling |
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 433-438, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 243 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ >>] |
|