The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase meet-in-the-middle (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1985-2003 (16) 2004-2007 (16) 2008-2009 (23) 2010-2011 (17) 2012-2013 (26) 2014-2015 (35) 2016 (21) 2017-2018 (21) 2019 (15) 2020-2022 (19) 2023 (25) 2024 (9)
Publication types (Num. hits)
article(129) incollection(2) inproceedings(111) phdthesis(1)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 97 occurrences of 50 keywords

Results
Found 243 publication records. Showing 243 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
23Akinori Hosoyamada, Yu Sasaki Quantum Demiric-Selçuk Meet-in-the-Middle Attacks: Applications to 6-Round Generic Feistel Constructions. Search on Bibsonomy SCN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
23Rongjia Li, Chenhui Jin Improved meet-in-the-middle attacks on Crypton and mCrypton. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Andreas Björklund, Petteri Kaski, Lukasz Kowalik Counting Thin Subgraphs via Packings Faster than Meet-in-the-Middle Time. Search on Bibsonomy ACM Trans. Algorithms The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Robert C. Holte, Ariel Felner, Guni Sharon, Nathan R. Sturtevant, Jingwei Chen MM: A bidirectional search algorithm that is guaranteed to meet in the middle. Search on Bibsonomy Artif. Intell. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Jingyi Cui, Jiansheng Guo, Yanyan Huang, Yipeng Liu Improved Meet-in-the-Middle Attacks on Crypton and mCrypton. Search on Bibsonomy KSII Trans. Internet Inf. Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Rongjia Li, Chenhui Jin Meet-in-the-Middle Attack on 11-Round 3D Block Cipher. Search on Bibsonomy Int. J. Found. Comput. Sci. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Akinori Hosoyamada, Yu Sasaki Quantum Meet-in-the-Middle Attacks: Applications to Generic Feistel Constructions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
23Le Dong, Yongxia Mao Meet-in-the-Middle Attacks on 3-Line Generalized Feistel Networks. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
23Li Lin 0003, Wenling Wu Meet-in-the-Middle Attacks on Reduced-Round Midori64. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Yuanhao Deng, Chenhui Jin, Rongjia Li Meet in the Middle Attack on Type-1 Feistel Construction. Search on Bibsonomy Inscrypt The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Mohamed Tolba, Amr M. Youssef Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Christine van Vredendaal Reduced memory meet-in-the-middle attack against the NTRU private key. Search on Bibsonomy LMS J. Comput. Math. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Riham AlTawy, Ahmed Abdelkhalek 0001, Amr M. Youssef A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b. Search on Bibsonomy IEICE Trans. Inf. Syst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Mohamed Tolba, Ahmed Abdelkhalek 0001, Amr M. Youssef A Meet in the Middle Attack on Reduced Round Kiasu-BC. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Lukasz Kowalik, Arkadiusz Socala Assigning Channels Via the Meet-in-the-Middle Approach. Search on Bibsonomy Algorithmica The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Rongjia Li, Chenhui Jin Meet-in-the-middle attacks on 10-round AES-256. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Jian Guo 0001, Jérémy Jean, Ivica Nikolic, Yu Sasaki Extended meet-in-the-middle attacks on some Feistel constructions. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Johannes Buchmann 0001, Florian Göpfert, Rachel Player, Thomas Wunderer On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
23Rui Zong, Xiaoyang Dong Meet-in-the-Middle Attack on QARMA Block Cipher. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
23Christine van Vredendaal Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
23Li Lin 0003, Wenling Wu Improved Meet-in-the-Middle Attacks on Reduced-Round Kalyna-128/256 and Kalyna-256/512. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
23Yonglin Hao Improved Meet-in-the-Middle Attacks on Round-Reduced Crypton-256. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
23Patrick Derbez, Pierre-Alain Fouque Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
23Ivica Nikolic, Yu Sasaki A New Algorithm for the Unbalanced Meet-in-the-Middle Problem. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
23Shahram Rasoolzadeh, Håvard Raddum Multidimensional Meet in the Middle Cryptanalysis of KATAN. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
23Jian Guo 0001, Jérémy Jean, Ivica Nikolic, Yu Sasaki Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
23Jian Guo 0001, Jérémy Jean, Ivica Nikolic, Yu Sasaki Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Ivica Nikolic, Yu Sasaki A New Algorithm for the Unbalanced Meet-in-the-Middle Problem. Search on Bibsonomy ASIACRYPT (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Robert C. Holte, Ariel Felner, Guni Sharon, Nathan R. Sturtevant Bidirectional Search That Is Guaranteed to Meet in the Middle. Search on Bibsonomy AAAI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Qianqian Yang 0003, Lei Hu, Siwei Sun, Ling Song 0001 Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR. Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Johannes Buchmann 0001, Florian Göpfert, Rachel Player, Thomas Wunderer On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack. Search on Bibsonomy AFRICACRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Patrick Derbez, Pierre-Alain Fouque Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks. Search on Bibsonomy CRYPTO (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Ivica Nikolic, Lei Wang 0031, Shuang Wu The parallel-cut meet-in-the-middle attack. Search on Bibsonomy Cryptogr. Commun. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Riham AlTawy, Amr M. Youssef A Meet in the Middle Attack on Reduced Round Kuznyechik. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Zhiqiang Liu 0001, Ya Liu 0001, Qingju Wang 0001, Dawu Gu, Wei Li 0013 Meet-in-the-middle fault analysis on word-oriented substitution-permutation network block ciphers. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Alex Biryukov, Patrick Derbez, Léo Perrin Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
23Patrick Derbez, Pierre-Alain Fouque Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks against Reduced-Round AES. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
23Thomas Espitau, Pierre-Alain Fouque, Pierre Karpman Higher-Order Differential Meet-in-The-Middle Preimage Attacks on SHA-1 and BLAKE. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
23Riham AlTawy, Amr M. Youssef Meet in the Middle Attacks on Reduced Round Kuznyechik. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
23Li Lin 0003, Wenling Wu Improved Meet-in-the-Middle Distinguisher on Feistel Schemes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
23Li Lin 0003, Wenling Wu Meet-in-the-Middle Attacks on Reduced-Round Midori-64. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
23Riham AlTawy, Ahmed Abdelkhalek 0001, Amr M. Youssef A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
23Patrick Derbez, Léo Perrin Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
23Yongguang Li, Guang Zeng, Wenbao Han 缩减轮数Crypton算法中间相遇攻击的改进 (Improved Meet-in-the-middle Attack on Reduced-round Crypton Cipher). Search on Bibsonomy 计算机科学 The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Li Lin 0003, Wenling Wu, Yafei Zheng Improved Meet-in-the-Middle Distinguisher on Feistel Schemes. Search on Bibsonomy SAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Mohamed Tolba, Ahmed Abdelkhalek 0001, Amr M. Youssef Meet-in-the-Middle Attacks on Reduced Round Piccolo. Search on Bibsonomy LightSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Mohamed Tolba, Ahmed Abdelkhalek 0001, Amr M. Youssef Meet-in-the-Middle Attacks on Round-Reduced Khudra. Search on Bibsonomy SPACE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Ahmed Abdelkhalek 0001, Riham AlTawy, Mohamed Tolba, Amr M. Youssef Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3. Search on Bibsonomy LATINCRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Leibo Li, Keting Jia, Xiaoyun Wang 0001, Xiaoyang Dong Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia. Search on Bibsonomy FSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Alex Biryukov, Patrick Derbez, Léo Perrin Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE. Search on Bibsonomy FSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Patrick Derbez, Léo Perrin Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE. Search on Bibsonomy FSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya Improved Meet-in-the-Middle Attacks on 7 and 8-Round ARIA-192 and ARIA-256. Search on Bibsonomy INDOCRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Thomas Espitau, Pierre-Alain Fouque, Pierre Karpman Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE. Search on Bibsonomy CRYPTO (1) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Bo Zhu 0007, Guang Gong Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64. Search on Bibsonomy Cryptogr. Commun. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Jukka Kohonen A Meet-in-the-Middle Algorithm for Finding Extremal Restricted Additive 2-Bases. Search on Bibsonomy J. Integer Seq. The full citation details ... 2014 DBLP  BibTeX  RDF
23Jiqiang Lu, Yongzhuang Wei, Jongsung Kim, Enes Pasalic The higher-order meet-in-the-middle attack and its application to the Camellia block cipher. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Lukasz Kowalik, Arkadiusz Socala Assigning channels via the meet-in-the-middle approach. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
23Shenghui Su, Tao Xie, Shuwang Lü A New Non-MDS Hash Function Resisting Birthday Attack and Meet-in-the-middle Attack. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
23Leibo Li, Keting Jia Improved Meet-in-the-Middle Attacks on Reduced-Round Camellia-192/256. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
23Andreas Björklund, Petteri Kaski, Lukasz Kowalik Counting Thin Subgraphs via Packings Faster Than Meet-in-the-Middle Time. Search on Bibsonomy SODA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Ling Song 0001, Lei Hu, Bingke Ma, Danping Shi Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers. Search on Bibsonomy LightSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Riham AlTawy, Amr M. Youssef Differential Sieving for 2-Step Matching Meet-in-the-Middle Attack with Application to LBlock. Search on Bibsonomy LightSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Yu Sasaki Memoryless Unbalanced Meet-in-the-Middle Attacks: Impossible Results and Applications. Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Jian Guo 0001, Jérémy Jean, Ivica Nikolic, Yu Sasaki Meet-in-the-Middle Attacks on Generic Feistel Constructions. Search on Bibsonomy ASIACRYPT (1) The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Yonglin Hao, Dongxia Bai, Leibo Li A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Thomas Fuhr 0001, Brice Minaud Match Box Meet-in-the-Middle Attack Against KATAN. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Lukasz Kowalik, Arkadiusz Socala Assigning Channels via the Meet-in-the-Middle Approach. Search on Bibsonomy SWAT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Yu Sasaki Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
23Matthew Amy, Dmitri Maslov, Michele Mosca, Martin Roetteler A Meet-in-the-Middle Algorithm for Fast Synthesis of Depth-Optimal Quantum Circuits. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
23Andreas Björklund, Petteri Kaski, Lukasz Kowalik Counting thin subgraphs via packings faster than meet-in-the-middle time. Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
23Pierre-Alain Fouque, Pierre Karpman Security Amplification against Meet-in-the-Middle Attacks Using Whitening. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
23Shenghui Su, Tao Xie, Shuwang Lü A Lightweight Hash Function Resisting Birthday Attack and Meet-in-the-middle Attack. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
23Ivica Nikolic, Lei Wang 0031, Shuang Wu The Parallel-Cut Meet-In-The-Middle Attack. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
23Yonglin Hao, Dongxia Bai A Meet-in-the-middle Attack on Round-Reduced mCrypton. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
23Leibo Li, Keting Jia, Xiaoyun Wang 0001 Improved Meet-in-the-Middle Attacks on AES-192 and PRINCE. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
23Özkan Boztas, Ferhat Karakoç, Mustafa Çoban Multidimensional Meet-in-the-Middle Attacks on Reduced-Round TWINE-128. Search on Bibsonomy LightSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
23Yu Sasaki, Wataru Komatsubara, Yasuhide Sakai, Lei Wang 0031, Mitsugu Iwamoto, Kazuo Sakiyama, Kazuo Ohta Meet-in-the-Middle Preimage Attacks Revisited - New Results on MD5 and HAVAL. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
23Dongxia Bai, Hongbo Yu Improved Meet-in-the-Middle Attacks on Round-Reduced ARIA. Search on Bibsonomy ISC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
23Patrick Derbez, Pierre-Alain Fouque Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES. Search on Bibsonomy FSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
23Li Lin 0003, Wenling Wu, Yanfeng Wang, Lei Zhang 0012 General Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher. Search on Bibsonomy ICISC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
23Pierre-Alain Fouque, Pierre Karpman Security Amplification against Meet-in-the-Middle Attacks Using Whitening. Search on Bibsonomy IMACC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
23Patrick Derbez Meet-in-the-Middle Attacks on AES. (Attaques par Rencontre par le Milieu sur l'AES). Search on Bibsonomy 2013   RDF
23Dukjae Moon, Deukjo Hong, Daesung Kwon, Seokhie Hong Meet-in-the-Middle Preimage Attacks on Hash Modes of Generalized Feistel and Misty Schemes with SP Round Function. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Lei Wang 0031, Yu Sasaki, Wataru Komatsubara, Kazuo Sakiyama, Kazuo Ohta Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions RIPEMD and RIPEMD-128. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Jung Hee Cheon, Jeongdae Hong, Gene Tsudik Reducing RFID reader load with the meet-in-the-middle strategy. Search on Bibsonomy J. Commun. Networks The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Matthew Amy, Dmitri Maslov, Michele Mosca, Martin Roetteler A meet-in-the-middle algorithm for fast synthesis of depth-optimal quantum circuits Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
23Yu Sasaki, Lei Wang 0031 Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Takanori Isobe 0001, Kyoji Shibutani All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Ji Li, Takanori Isobe 0001, Kyoji Shibutani Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2. Search on Bibsonomy FSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Christian Rechberger On Bruteforce-Like Cryptanalysis: New Meet-in-the-Middle Attacks in Symmetric Cryptanalysis. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Jiqiang Lu, Yongzhuang Wei, Enes Pasalic, Pierre-Alain Fouque Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher. Search on Bibsonomy IWSEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Jiqiang Lu, Yongzhuang Wei, Jongsung Kim, Enes Pasalic The Higher-Order Meet-in-the-Middle Attack and Its Application to the Camellia Block Cipher. Search on Bibsonomy INDOCRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Yu Sasaki, Lei Wang 0031, Yasuhide Sakai, Kazuo Sakiyama, Kazuo Ohta Three-Subset Meet-in-the-Middle Attack on Reduced XTEA. Search on Bibsonomy AFRICACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Alex Biryukov Meet-in-the-Middle Attack. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Bo Zhu 0007, Guang Gong Guess-then-Meet-in-the-Middle Attacks on the KTANTAN Family of Block Ciphers. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2011 DBLP  BibTeX  RDF
23Lei Wei 0001, Christian Rechberger, Jian Guo 0001, Hongjun Wu 0001, Huaxiong Wang, San Ling Improved Meet-in-the-Middle Cryptanalysis of KTANTAN. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2011 DBLP  BibTeX  RDF
23Keting Jia, Hongbo Yu, Xiaoyun Wang 0001 A Meet-in-the-Middle Attack on the Full KASUMI. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2011 DBLP  BibTeX  RDF
23Xuehai Tang, Bing Sun 0001, Ruilin Li, Chao Li 0002, Juhua Yin A meet-in-the-middle attack on reduced-round ARIA. Search on Bibsonomy J. Syst. Softw. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Yu Sasaki Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool. Search on Bibsonomy FSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Lei Wei 0001, Christian Rechberger, Jian Guo 0001, Hongjun Wu 0001, Huaxiong Wang, San Ling Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster). Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 243 (100 per page; Change: )
Pages: [<<][1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license