Derbez, Patrick; Perrin, Léo Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE. (English) Zbl 07211776 J. Cryptology 33, No. 3, 1184-1215 (2020). MSC: 94A60 94A62 68P25 94A55 PDF BibTeX XML Cite \textit{P. Derbez} and \textit{L. Perrin}, J. Cryptology 33, No. 3, 1184--1215 (2020; Zbl 07211776) Full Text: DOI
Li, Rongjia; Jin, Chenhui; Pan, Hongchen Key recovery attacks on reduced-round Joltik-BC in the single-key setting. (English) Zbl 07107778 Inf. Process. Lett. 151, Article ID 105834 (2019). MSC: 68Q PDF BibTeX XML Cite \textit{R. Li} et al., Inf. Process. Lett. 151, Article ID 105834 (2019; Zbl 07107778) Full Text: DOI
Fu, Xiangqun; Bao, Wansu; Shi, Jianhong; Li, Tan; Wang, Xiang Quantum binary search algorithm. (English) Zbl 1433.81052 Int. J. Theor. Phys. 58, No. 5, 1534-1540 (2019). MSC: 81P68 PDF BibTeX XML Cite \textit{X. Fu} et al., Int. J. Theor. Phys. 58, No. 5, 1534--1540 (2019; Zbl 1433.81052) Full Text: DOI
Côté, Jean-François; Iori, Manuel The meet-in-the-middle principle for cutting and packing problems. (English) Zbl 07281465 INFORMS J. Comput. 30, No. 4, 646-661 (2018). MSC: 90C PDF BibTeX XML Cite \textit{J.-F. Côté} and \textit{M. Iori}, INFORMS J. Comput. 30, No. 4, 646--661 (2018; Zbl 07281465) Full Text: DOI
Hosoyamada, Akinori; Sasaki, Yu Cryptanalysis against symmetric-key schemes with online classical queries and offline quantum computations. (English) Zbl 07154103 Smart, Nigel P. (ed.), Topics in cryptology – CT-RSA 2018. The cryptographers’ track at the RSA conference 2018, San Francisco, CA, USA, April 16–20, 2018. Proceedings. Cham: Springer (ISBN 978-3-319-76952-3/pbk; 978-3-319-76953-0/ebook). Lecture Notes in Computer Science 10808, 198-218 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{A. Hosoyamada} and \textit{Y. Sasaki}, Lect. Notes Comput. Sci. 10808, 198--218 (2018; Zbl 07154103) Full Text: DOI
Xu, Lidong; Wang, Mingqiang A meet-in-the-middle attack on 10-round AES-128. (Chinese. English summary) Zbl 1424.94074 J. Shandong Univ., Nat. Sci. 53, No. 7, 39-45 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{L. Xu} and \textit{M. Wang}, J. Shandong Univ., Nat. Sci. 53, No. 7, 39--45 (2018; Zbl 1424.94074) Full Text: DOI
Shi, Danping; Sun, Siwei; Derbez, Patrick; Todo, Yosuke; Sun, Bing; Hu, Lei Programming the Demirci-Selçuk meet-in-the-middle attack with constraints. (English) Zbl 1446.94157 Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11273, 3-34 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{D. Shi} et al., Lect. Notes Comput. Sci. 11273, 3--34 (2018; Zbl 1446.94157) Full Text: DOI
Sasaki, Yu Integer linear programming for three-subset meet-in-the-middle attacks: application to GIFT. (English) Zbl 1398.94157 Inomata, Atsuo (ed.) et al., Advances in information and computer security. 13th international workshop on security, IWSEC 2018, Sendai, Japan, September 3–5, 2018. Proceedings. Cham: Springer (ISBN 978-3-319-97915-1/pbk; 978-3-319-97916-8/ebook). Lecture Notes in Computer Science 11049, 227-243 (2018). MSC: 94A60 90C10 PDF BibTeX XML Cite \textit{Y. Sasaki}, Lect. Notes Comput. Sci. 11049, 227--243 (2018; Zbl 1398.94157) Full Text: DOI
Hosoyamada, Akinori; Sasaki, Yu Quantum Demiric-Selçuk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions. (English) Zbl 06957564 Catalano, Dario (ed.) et al., Security and cryptography for networks. 11th international conference, SCN 2018, Amalfi, Italy, September 5–7, 2018. Proceedings. Cham: Springer (ISBN 978-3-319-98112-3/pbk; 978-3-319-98113-0/ebook). Lecture Notes in Computer Science 11035, 386-403 (2018). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{A. Hosoyamada} and \textit{Y. Sasaki}, Lect. Notes Comput. Sci. 11035, 386--403 (2018; Zbl 06957564) Full Text: DOI
Tolba, Mohamed; Youssef, Amr M. Improved meet-in-the-middle attacks on reduced round Kuznyechik. (English) Zbl 06889979 Kim, Howon (ed.) et al., Information security and cryptology – ICISC 2017. 20th international conference, Seoul, South Korea, November 29 – December 1, 2017. Revised selected papers. Cham: Springer (ISBN 978-3-319-78555-4/pbk; 978-3-319-78556-1/ebook). Lecture Notes in Computer Science 10779, 26-38 (2018). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{M. Tolba} and \textit{A. M. Youssef}, Lect. Notes Comput. Sci. 10779, 26--38 (2018; Zbl 06889979) Full Text: DOI
Kacsmar, Bailey; Plosker, Sarah; Henry, Ryan Computing low-weight discrete logarithms. (English) Zbl 1384.94074 Adams, Carlisle (ed.) et al., Selected areas in cryptography – SAC 2017. 24th international conference, Ottawa, ON, Canada, August 16–18, 2017. Revised selected papers. Cham: Springer (ISBN 978-3-319-72564-2/pbk; 978-3-319-72565-9/ebook). Lecture Notes in Computer Science 10719, 106-126 (2018). MSC: 94A60 94A62 11T71 PDF BibTeX XML Cite \textit{B. Kacsmar} et al., Lect. Notes Comput. Sci. 10719, 106--126 (2018; Zbl 1384.94074) Full Text: DOI
Deng, Yuanhao; Jin, Chenhui; Li, Rongjia Meet in the middle attack on type-1 Feistel construction. (English) Zbl 1439.94028 Chen, Xiaofeng (ed.) et al., Information security and cryptology. 13th international conference, Inscrypt 2017, Xi’an, China, November 3–5, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10726, 427-444 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{Y. Deng} et al., Lect. Notes Comput. Sci. 10726, 427--444 (2018; Zbl 1439.94028) Full Text: DOI
Lin, Li; Wu, Wenling Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512. (English) Zbl 1414.94913 Des. Codes Cryptography 86, No. 4, 721-741 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{L. Lin} and \textit{W. Wu}, Des. Codes Cryptography 86, No. 4, 721--741 (2018; Zbl 1414.94913) Full Text: DOI
Agibalov, G. P.; Pankratova, I. A. About 2-cascade finite automata cryptographic generators and their cryptanalysis. (Russian. English summary) Zbl 07311413 Prikl. Diskretn. Mat. 2017, No. 1(35), 38-47 (2017). MSC: 68 94 PDF BibTeX XML Cite \textit{G. P. Agibalov} and \textit{I. A. Pankratova}, Prikl. Diskretn. Mat. 2017, No. 1(35), 38--47 (2017; Zbl 07311413) Full Text: DOI MNR
Björklund, Andreas; Kaski, Petteri; Kowalik, Łukasz Counting thin subgraphs via packings faster than meet-in-the-middle time. (English) Zbl 1452.68133 ACM Trans. Algorithms 13, No. 4, Article No. 48, 26 p. (2017). MSC: 68R10 05C30 05C70 05C85 68W40 PDF BibTeX XML Cite \textit{A. Björklund} et al., ACM Trans. Algorithms 13, No. 4, Article No. 48, 26 p. (2017; Zbl 1452.68133) Full Text: DOI
Isobe, Takanori; Shibutani, Kyoji New key recovery attacks on minimal two-round Even-Mansour ciphers. (English) Zbl 1420.94075 Takagi, Tsuyoshi (ed.) et al., Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10624, 244-263 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{T. Isobe} and \textit{K. Shibutani}, Lect. Notes Comput. Sci. 10624, 244--263 (2017; Zbl 1420.94075) Full Text: DOI
Funabiki, Yuki; Todo, Yosuke; Isobe, Takanori; Morii, Masakatu Improved integral attack on HIGHT. (English) Zbl 1416.94050 Pieprzyk, Josef (ed.) et al., Information security and privacy. 22nd Australasian conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10342, 363-383 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{Y. Funabiki} et al., Lect. Notes Comput. Sci. 10342, 363--383 (2017; Zbl 1416.94050) Full Text: DOI
Huang, Jialin; Yan, Hailun; Lai, Xuejia Transposition of AES key schedule. (English) Zbl 1360.94310 Chen, Kefei (ed.) et al., Information security and cryptology. 12th international conference, Inscrypt 2016, Beijing, China, November 4–6, 2016. Revised selected papers. Cham: Springer (ISBN 978-3-319-54704-6/pbk; 978-3-319-54705-3/ebook). Lecture Notes in Computer Science 10143, 84-102 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{J. Huang} et al., Lect. Notes Comput. Sci. 10143, 84--102 (2017; Zbl 1360.94310) Full Text: DOI
Li, Rongjia; Jin, Chenhui Meet-in-the-middle attack on 11-round 3D block cipher. (English) Zbl 1362.94039 Int. J. Found. Comput. Sci. 28, No. 1, 19-28 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{R. Li} and \textit{C. Jin}, Int. J. Found. Comput. Sci. 28, No. 1, 19--28 (2017; Zbl 1362.94039) Full Text: DOI
Fu, Xiang-Qun; Bao, Wan-Su; Wang, Xiang; Shi, Jian-Hong General quantum meet-in-the-middle search algorithm based on target solution of fixed weight. (English) Zbl 1375.81075 Commun. Theor. Phys. 66, No. 4, 401-406 (2016). MSC: 81P94 81P45 81P68 PDF BibTeX XML Cite \textit{X.-Q. Fu} et al., Commun. Theor. Phys. 66, No. 4, 401--406 (2016; Zbl 1375.81075) Full Text: DOI
Rasoolzadeh, Shahram; Raddum, Håvard Improved multi-dimensional meet-in-the-middle cryptanalysis of KATAN. (English) Zbl 1436.94089 Tatra Mt. Math. Publ. 67, 149-166 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{S. Rasoolzadeh} and \textit{H. Raddum}, Tatra Mt. Math. Publ. 67, 149--166 (2016; Zbl 1436.94089) Full Text: DOI
Asgari Chenaghlu, Meysam; Jamali, Shahram; Nikzad Khasmakhi, Narjes A novel keyed parallel hashing scheme based on a new chaotic system. (English) Zbl 1355.94044 Chaos Solitons Fractals 87, 216-225 (2016). MSC: 94A60 37D45 37E05 PDF BibTeX XML Cite \textit{M. Asgari Chenaghlu} et al., Chaos Solitons Fractals 87, 216--225 (2016; Zbl 1355.94044) Full Text: DOI
Nikolić, Ivica; Sasaki, Yu A new algorithm for the unbalanced meet-in-the-middle problem. (English) Zbl 1404.94102 Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4–8, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53886-9/pbk; 978-3-662-53887-6/ebook). Lecture Notes in Computer Science 10031, 627-647 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{I. Nikolić} and \textit{Y. Sasaki}, Lect. Notes Comput. Sci. 10031, 627--647 (2016; Zbl 1404.94102) Full Text: DOI
Su, Shenghui; Xie, Tao; Lü, Shuwang A provably secure non-iterative hash function resisting birthday attack. (English) Zbl 1371.94657 Theor. Comput. Sci. 654, 128-142 (2016). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{S. Su} et al., Theor. Comput. Sci. 654, 128--142 (2016; Zbl 1371.94657) Full Text: DOI
Derbez, Patrick; Fouque, Pierre-Alain Automatic search of meet-in-the-middle and impossible differential attacks. (English) Zbl 1372.94422 Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-53007-8/pbk; 978-3-662-53008-5/ebook). Lecture Notes in Computer Science 9815, 157-184 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{P. Derbez} and \textit{P.-A. Fouque}, Lect. Notes Comput. Sci. 9815, 157--184 (2016; Zbl 1372.94422) Full Text: DOI
Guo, Jian; Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu Extended meet-in-the-middle attacks on some Feistel constructions. (English) Zbl 1348.94053 Des. Codes Cryptography 80, No. 3, 587-618 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{J. Guo} et al., Des. Codes Cryptography 80, No. 3, 587--618 (2016; Zbl 1348.94053) Full Text: DOI
Li, Rongjia; Jin, Chenhui Meet-in-the-middle attacks on 10-round AES-256. (English) Zbl 1402.94062 Des. Codes Cryptography 80, No. 3, 459-471 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{R. Li} and \textit{C. Jin}, Des. Codes Cryptography 80, No. 3, 459--471 (2016; Zbl 1402.94062) Full Text: DOI
Rasoolzadeh, Shahram; Raddum, Håvard Cryptanalysis of PRINCE with minimal data. (English) Zbl 1404.94107 Pointcheval, David (ed.) et al., Progress in cryptology – AFRICACRYPT 2016. 8th international conference on cryptology in Africa, Fes, Morocco, April 13–15, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-31516-4/pbk; 978-3-319-31517-1/ebook). Lecture Notes in Computer Science 9646, 109-126 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{S. Rasoolzadeh} and \textit{H. Raddum}, Lect. Notes Comput. Sci. 9646, 109--126 (2016; Zbl 1404.94107) Full Text: DOI
Kowalik, Łukasz; Socała, Arkadiusz Assigning channels via the meet-in-the-middle approach. (English) Zbl 1339.68119 Algorithmica 74, No. 4, 1435-1452 (2016). MSC: 68Q25 05C15 05C70 05C85 PDF BibTeX XML Cite \textit{Ł. Kowalik} and \textit{A. Socała}, Algorithmica 74, No. 4, 1435--1452 (2016; Zbl 1339.68119) Full Text: DOI
Lin, Li; Wu, Wenling; Zheng, Yafei Improved meet-in-the-middle distinguisher on Feistel schemes. (English) Zbl 1396.94089 Dunkelman, Orr (ed.) et al., Selected areas in cryptography – SAC 2015. 22nd international conference, Sackville, NB, Canada, August 12–14, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-31300-9/pbk; 978-3-319-31301-6/ebook). Lecture Notes in Computer Science 9566, 122-142 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{L. Lin} et al., Lect. Notes Comput. Sci. 9566, 122--142 (2016; Zbl 1396.94089) Full Text: DOI
Zhang, Huiling; Wu, Wenling; Wang, Yanfeng Integral attack against bit-oriented block ciphers. (English) Zbl 1384.94114 Kwon, Soonhak (ed.) et al., Information security and cryptology – ICISC 2015. 18th international conference, Seoul, South Korea, November 25–27, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-30839-5/pbk; 978-3-319-30840-1/ebook). Lecture Notes in Computer Science 9558, 102-118 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{H. Zhang} et al., Lect. Notes Comput. Sci. 9558, 102--118 (2016; Zbl 1384.94114) Full Text: DOI
Tolba, Mohamed; Abdelkhalek, Ahmed; Youssef, Amr M. Meet-in-the-middle attacks on reduced round Piccolo. (English) Zbl 1412.94217 Güneysu, Tim (ed.) et al., Lightweight cryptography for security and privacy. 4th international workshop, LightSec 2015, Bochum, Germany, September 10–11, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9542, 3-20 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{M. Tolba} et al., Lect. Notes Comput. Sci. 9542, 3--20 (2016; Zbl 1412.94217) Full Text: DOI
Tolba, Mohamed; Youssef, Amr M. Generalized MitM attacks on full TWINE. (English) Zbl 1346.94130 Inf. Process. Lett. 116, No. 2, 128-135 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{M. Tolba} and \textit{A. M. Youssef}, Inf. Process. Lett. 116, No. 2, 128--135 (2016; Zbl 1346.94130) Full Text: DOI
Ma, Bingke; Li, Bao; Hao, Ronglin; Li, Xiaoqian Improved (pseudo) preimage attacks on reduced-round GOST and Grøstl-256 and studies on several truncation patterns for AES-like compression functions. (English) Zbl 1398.94140 Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 79-96 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{B. Ma} et al., Lect. Notes Comput. Sci. 9241, 79--96 (2015; Zbl 1398.94140) Full Text: DOI
Wang, Yanfeng; Wu, Wenling Meet-in-the-middle attack on TWINE block cipher. (Chinese. English summary) Zbl 1349.94136 J. Softw. 26, No. 10, 2684-2695 (2015). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{Y. Wang} and \textit{W. Wu}, J. Softw. 26, No. 10, 2684--2695 (2015; Zbl 1349.94136) Full Text: DOI
Li, Junzhi; Li, Wen; Li, Wei; Guan, Jie Meet-in-the-middle cube attack on reduced version of KeeLoq. (Chinese. English summary) Zbl 1349.94125 J. Shanghai Jiaotong Univ. (Chin. Ed.) 49, No. 10, 1540-1544 (2015). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{J. Li} et al., J. Shanghai Jiaotong Univ. (Chin. Ed.) 49, No. 10, 1540--1544 (2015; Zbl 1349.94125) Full Text: DOI
Dong, Xiaoyang; Li, Leibo; Jia, Keting; Wang, Xiaoyun Improved attacks on reduced-round Camellia-128/192/256. (English) Zbl 1382.94098 Nyberg, Kaisa (ed.), Topics in cryptology – CT-RSA 2015. The cryptographer’s track at the RSA conference 2015, San Francisco, CA, USA, April 20–24, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-16714-5/pbk; 978-3-319-16715-2/ebook). Lecture Notes in Computer Science 9048, 59-83 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{X. Dong} et al., Lect. Notes Comput. Sci. 9048, 59--83 (2015; Zbl 1382.94098) Full Text: DOI
Espitau, Thomas; Fouque, Pierre-Alain; Karpman, Pierre Higher-order differential meet-in-the-middle preimage attacks on SHA-1 and BLAKE. (English) Zbl 1375.94123 Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 683-701 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{T. Espitau} et al., Lect. Notes Comput. Sci. 9215, 683--701 (2015; Zbl 1375.94123) Full Text: DOI
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi New attacks on Feistel structures with improved memory complexities. (English) Zbl 1375.94120 Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 433-454 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{I. Dinur} et al., Lect. Notes Comput. Sci. 9215, 433--454 (2015; Zbl 1375.94120) Full Text: DOI
AlTawy, Riham; Youssef, Amr M. Second preimage analysis of Whirlwind. (English) Zbl 1400.94109 Lin, Dongdai (ed.) et al., Information security and cryptology. 10th international conference, Inscrypt 2014, Beijing, China, December 13–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16744-2/pbk; 978-3-319-16745-9/ebook). Lecture Notes in Computer Science 8957, 311-328 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{R. AlTawy} and \textit{A. M. Youssef}, Lect. Notes Comput. Sci. 8957, 311--328 (2015; Zbl 1400.94109) Full Text: DOI
Nikolić, Ivica; Wang, Lei; Wu, Shuang The parallel-cut meet-in-the-middle attack. (English) Zbl 1343.94074 Cryptogr. Commun. 7, No. 3, 331-345 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{I. Nikolić} et al., Cryptogr. Commun. 7, No. 3, 331--345 (2015; Zbl 1343.94074) Full Text: DOI
Su, Shenghui; Xie, Tao; Lü, Shuwang A new non-Merkle-Damgård structural hash function with provable security. (English) Zbl 06501953 Xu, Dachuan (ed.) et al., Computing and combinatorics. 21st international conference, COCOON 2015, Beijing, China, August 4–6, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-21397-2/pbk; 978-3-319-21398-9/ebook). Lecture Notes in Computer Science 9198, 661-673 (2015). MSC: 68Rxx PDF BibTeX XML Cite \textit{S. Su} et al., Lect. Notes Comput. Sci. 9198, 661--673 (2015; Zbl 06501953) Full Text: DOI
Bernstein, Daniel J.; Hülsing, Andreas; Lange, Tanja; Niederhagen, Ruben Bad directions in cryptographic hash functions. (English) Zbl 1391.94729 Foo, Ernest (ed.) et al., Information security and privacy. 20th Australasian conference, ACISP 2015, Brisbane, QLD, Australia, June 29 – July 1, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-19961-0/pbk; 978-3-319-19962-7/ebook). Lecture Notes in Computer Science 9144, 488-508 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{D. J. Bernstein} et al., Lect. Notes Comput. Sci. 9144, 488--508 (2015; Zbl 1391.94729) Full Text: DOI
May, Alexander; Ozerov, Ilya On computing nearest neighbors with applications to decoding of binary linear codes. (English) Zbl 1365.94597 Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-46799-2/pbk; 978-3-662-46800-5/ebook). Lecture Notes in Computer Science 9056, 203-228 (2015). MSC: 94B35 94B05 PDF BibTeX XML Cite \textit{A. May} and \textit{I. Ozerov}, Lect. Notes Comput. Sci. 9056, 203--228 (2015; Zbl 1365.94597) Full Text: DOI
AlTawy, Riham; Tolba, Mohamed; Youssef, Amr M. A higher order key partitioning attack with application to LBlock. (English) Zbl 1441.94067 El Hajji, Said (ed.) et al., Codes, cryptology, and information security. First international conference, C2SI 2015, Rabat, Morocco, May 26–28, 2015. Proceedings – in honor of Thierry Berger. Cham: Springer. Lect. Notes Comput. Sci. 9084, 215-227 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{R. AlTawy} et al., Lect. Notes Comput. Sci. 9084, 215--227 (2015; Zbl 1441.94067) Full Text: DOI
Song, Ling; Hu, Lei; Ma, Bingke; Shi, Danping Match box meet-in-the-middle attacks on the SIMON family of block ciphers. (English) Zbl 1382.94162 Eisenbarth, Thomas (ed.) et al., Lightweight cryptography for security and privacy. Third international workshop, LightSec 2014, Istanbul, Turkey, September 1–2, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16362-8/pbk; 978-3-319-16363-5/ebook). Lecture Notes in Computer Science 8898, 140-151 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{L. Song} et al., Lect. Notes Comput. Sci. 8898, 140--151 (2015; Zbl 1382.94162) Full Text: DOI
AlTawy, Riham; Youssef, Amr Differential sieving for 2-step matching meet-in-the-middle attack with application to lblock. (English) Zbl 1382.94039 Eisenbarth, Thomas (ed.) et al., Lightweight cryptography for security and privacy. Third international workshop, LightSec 2014, Istanbul, Turkey, September 1–2, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16362-8/pbk; 978-3-319-16363-5/ebook). Lecture Notes in Computer Science 8898, 126-139 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{R. AlTawy} and \textit{A. Youssef}, Lect. Notes Comput. Sci. 8898, 126--139 (2015; Zbl 1382.94039) Full Text: DOI
Derbez, Patrick; Perrin, Léo Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE. (English) Zbl 1367.94308 Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 190-216 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{P. Derbez} and \textit{L. Perrin}, Lect. Notes Comput. Sci. 9054, 190--216 (2015; Zbl 1367.94308) Full Text: DOI
Biryukov, Alex; Derbez, Patrick; Perrin, Léo Differential analysis and meet-in-the-middle attack against round-reduced TWINE. (English) Zbl 1367.94300 Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 3-27 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{A. Biryukov} et al., Lect. Notes Comput. Sci. 9054, 3--27 (2015; Zbl 1367.94300) Full Text: DOI
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi Improved linear sieving techniques with applications to step-reduced LED-64. (English) Zbl 1382.94090 Cid, Carlos (ed.) et al., Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3–5, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-662-46705-3/pbk; 978-3-662-46706-0/ebook). Lecture Notes in Computer Science 8540, 390-410 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{I. Dinur} et al., Lect. Notes Comput. Sci. 8540, 390--410 (2015; Zbl 1382.94090) Full Text: DOI
Li, Leibo; Jia, Keting; Wang, Xiaoyun Improved single-key attacks on 9-round AES-192/256. (English) Zbl 1360.94317 Cid, Carlos (ed.) et al., Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3–5, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-662-46705-3/pbk; 978-3-662-46706-0/ebook). Lecture Notes in Computer Science 8540, 127-146 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{L. Li} et al., Lect. Notes Comput. Sci. 8540, 127--146 (2015; Zbl 1360.94317) Full Text: DOI
Isobe, Takanori; Shibutani, Kyoji Improved all-subkeys recovery attacks on FOX, KATAN and SHACAL-2 block ciphers. (English) Zbl 1382.94119 Cid, Carlos (ed.) et al., Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3–5, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-662-46705-3/pbk; 978-3-662-46706-0/ebook). Lecture Notes in Computer Science 8540, 104-126 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{T. Isobe} and \textit{K. Shibutani}, Lect. Notes Comput. Sci. 8540, 104--126 (2015; Zbl 1382.94119) Full Text: DOI
Fuhr, Thomas; Minaud, Brice Match box meet-in-the-middle attack against KATAN. (English) Zbl 1382.94106 Cid, Carlos (ed.) et al., Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3–5, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-662-46705-3/pbk; 978-3-662-46706-0/ebook). Lecture Notes in Computer Science 8540, 61-81 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{T. Fuhr} and \textit{B. Minaud}, Lect. Notes Comput. Sci. 8540, 61--81 (2015; Zbl 1382.94106) Full Text: DOI
Abdelkhalek, Ahmed; AlTawy, Riham; Tolba, Mohamed; Youssef, Amr M. Meet-in-the-middle attacks on reduced-round Hierocrypt-3. (English) Zbl 1370.94474 Lauter, Kristin (ed.) et al., Progress in cryptology – LATINCRYPT 2015. 4th international conference on cryptology and information security in Latin America, Guadalajara, Mexico, August 23–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22173-1/pbk; 978-3-319-22174-8/ebook). Lecture Notes in Computer Science 9230, 187-203 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{A. Abdelkhalek} et al., Lect. Notes Comput. Sci. 9230, 187--203 (2015; Zbl 1370.94474) Full Text: DOI
Bogdanov, Andrey; Chang, Donghoon; Ghosh, Mohona; Sanadhya, Somitra Kumar Bicliques with minimal data and time complexity for AES. (English) Zbl 1356.94051 Lee, Jooyoung (ed.) et al., Information security and cryptology – ICISC 2014. 17th international conference, Seoul, Korea, December 3–5, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-15942-3/pbk; 978-3-319-15943-0/ebook). Lecture Notes in Computer Science 8949, 160-174 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{A. Bogdanov} et al., Lect. Notes Comput. Sci. 8949, 160--174 (2015; Zbl 1356.94051) Full Text: DOI
Guo, Jian; Su, Chunhua; Yap, Wun-She An improved preimage attack against HAVAL-3. (English) Zbl 1320.94065 Inf. Process. Lett. 115, No. 2, 386-393 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{J. Guo} et al., Inf. Process. Lett. 115, No. 2, 386--393 (2015; Zbl 1320.94065) Full Text: DOI
Biham, Eli; Carmeli, Yaniv An improvement of linear cryptanalysis with addition operations with applications to FEAL-8X. (English) Zbl 1382.94064 Joux, Antoine (ed.) et al., Selected areas in cryptography – SAC 2014. 21st international conference, Montreal, QC, Canada, August 14–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-13050-7/pbk; 978-3-319-13051-4/ebook). Lecture Notes in Computer Science 8781, 59-76 (2014). MSC: 94A60 PDF BibTeX XML Cite \textit{E. Biham} and \textit{Y. Carmeli}, Lect. Notes Comput. Sci. 8781, 59--76 (2014; Zbl 1382.94064) Full Text: DOI
Zou, Jian; Wu, Wenling; Wu, Shuang Cryptanalysis of the round-reduced GOST hash function. (English) Zbl 1347.94067 Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 309-322 (2014). MSC: 94A60 PDF BibTeX XML Cite \textit{J. Zou} et al., Lect. Notes Comput. Sci. 8567, 309--322 (2014; Zbl 1347.94067) Full Text: DOI
Huang, Jialin; Lai, Xuejia What is the effective key length for a block cipher: an attack on every practical block cipher. (English) Zbl 1357.94068 Sci. China, Inf. Sci. 57, No. 7, Article ID 072110, 11 p. (2014). MSC: 94A60 PDF BibTeX XML Cite \textit{J. Huang} and \textit{X. Lai}, Sci. China, Inf. Sci. 57, No. 7, Article ID 072110, 11 p. (2014; Zbl 1357.94068) Full Text: DOI
Wang, Gaoli; Shen, Yanzhao (Pseudo-)preimage attacks on step-reduced HAS-160 and RIPEMD-160. (English) Zbl 1336.94074 Chow, Sherman S. M. (ed.) et al., Information security. 17th international conference, ISC 2014, Hong Kong, China, October 12–14, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-13256-3/pbk). Lecture Notes in Computer Science 8783, 90-103 (2014). MSC: 94A60 PDF BibTeX XML Cite \textit{G. Wang} and \textit{Y. Shen}, Lect. Notes Comput. Sci. 8783, 90--103 (2014; Zbl 1336.94074) Full Text: DOI
AlTawy, Riham; Kircanski, Aleksandar; Youssef, Amr M. Rebound attacks on Stribog. (English) Zbl 1368.94081 Lee, Hyang-Sook (ed.) et al., Information security and cryptology – ICISC 2013. 16th international conference, Seoul, Korea, November 27–29, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12159-8/pbk; 978-3-319-12160-4/ebook). Lecture Notes in Computer Science 8565, 175-188 (2014). MSC: 94A60 PDF BibTeX XML Cite \textit{R. AlTawy} et al., Lect. Notes Comput. Sci. 8565, 175--188 (2014; Zbl 1368.94081) Full Text: DOI
Huang, Jialin; Vaudenay, Serge; Lai, Xuejia On the key schedule of lightweight block ciphers. (English) Zbl 1344.94057 Meier, Willi (ed.) et al., Progress in cryptology – INDOCRYPT 2014. 15th international conference on cryptology in India, New Delhi, India, December 14–17, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-13038-5/pbk; 978-3-319-13039-2/ebook). Lecture Notes in Computer Science 8885, 124-142 (2014). MSC: 94A60 PDF BibTeX XML Cite \textit{J. Huang} et al., Lect. Notes Comput. Sci. 8885, 124--142 (2014; Zbl 1344.94057) Full Text: DOI
Guo, Jian; Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu Meet-in-the-middle attacks on generic Feistel constructions. (English) Zbl 1306.94058 Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 458-477 (2014). MSC: 94A60 PDF BibTeX XML Cite \textit{J. Guo} et al., Lect. Notes Comput. Sci. 8873, 458--477 (2014; Zbl 1306.94058) Full Text: DOI
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi Cryptanalysis of iterated Even-Mansour schemes with two keys. (English) Zbl 1306.94048 Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 439-457 (2014). MSC: 94A60 PDF BibTeX XML Cite \textit{I. Dinur} et al., Lect. Notes Comput. Sci. 8873, 439--457 (2014; Zbl 1306.94048) Full Text: DOI
Zhu, Bo; Gong, Guang Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64. (English) Zbl 1298.94118 Cryptogr. Commun. 6, No. 4, 313-333 (2014). MSC: 94A60 PDF BibTeX XML Cite \textit{B. Zhu} and \textit{G. Gong}, Cryptogr. Commun. 6, No. 4, 313--333 (2014; Zbl 1298.94118) Full Text: DOI
Sasaki, Yu Memoryless unbalanced meet-in-the-middle attacks: impossible results and applications. (English) Zbl 1353.94072 Boureanu, Ioana (ed.) et al., Applied cryptography and network security. 12th international conference, ACNS 2014, Lausanne, Switzerland, June 10–13, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-07535-8/pbk). Lecture Notes in Computer Science 8479, 253-270 (2014). MSC: 94A60 PDF BibTeX XML Cite \textit{Y. Sasaki}, Lect. Notes Comput. Sci. 8479, 253--270 (2014; Zbl 1353.94072) Full Text: DOI
AlTawy, Riham; Youssef, Amr M. Preimage attacks on reduced-round Stribog. (English) Zbl 1288.94048 Pointcheval, David (ed.) et al., Progress in cryptology – AFRICACRYPT 2014. 7th international conference on cryptology in Africa, Marrakesh, Morocco, May 28–30, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-06733-9/pbk). Lecture Notes in Computer Science 8469, 109-125 (2014). MSC: 94A60 PDF BibTeX XML Cite \textit{R. AlTawy} and \textit{A. M. Youssef}, Lect. Notes Comput. Sci. 8469, 109--125 (2014; Zbl 1288.94048) Full Text: DOI
Lu, Jiqiang; Wei, Yongzhuang; Kim, Jongsung; Pasalic, Enes The higher-order meet-in-the-middle attack and its application to the Camellia block cipher. (English) Zbl 1291.94120 Theor. Comput. Sci. 527, 102-122 (2014). MSC: 94A60 PDF BibTeX XML Cite \textit{J. Lu} et al., Theor. Comput. Sci. 527, 102--122 (2014; Zbl 1291.94120) Full Text: DOI
Sasaki, Yu; Wang, Lei Meet-in-the-middle technique for integral attacks against Feistel ciphers. (English) Zbl 1327.94073 Knudsen, Lars R. (ed.) et al., Selected areas in cryptography. 19th international conference, SAC 2012, Windsor, Canada, August 15–16, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-35998-9/pbk; 978-3-642-35999-6/ebook). Lecture Notes in Computer Science 7707, 234-251 (2013). MSC: 94A60 PDF BibTeX XML Cite \textit{Y. Sasaki} and \textit{L. Wang}, Lect. Notes Comput. Sci. 7707, 234--251 (2013; Zbl 1327.94073) Full Text: DOI
Isobe, Takanori; Shibutani, Kyoji All subkeys recovery attack on block ciphers: extending meet-in-the-middle approach. (English) Zbl 1327.94053 Knudsen, Lars R. (ed.) et al., Selected areas in cryptography. 19th international conference, SAC 2012, Windsor, Canada, August 15–16, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-35998-9/pbk; 978-3-642-35999-6/ebook). Lecture Notes in Computer Science 7707, 202-221 (2013). MSC: 94A60 PDF BibTeX XML Cite \textit{T. Isobe} and \textit{K. Shibutani}, Lect. Notes Comput. Sci. 7707, 202--221 (2013; Zbl 1327.94053) Full Text: DOI
Karakoç, F.; Demirci, H.; Harmancı, A. E. Biclique cryptanalysis of LBlock and TWINE. (English) Zbl 1356.94063 Inf. Process. Lett. 113, No. 12, 423-429 (2013). MSC: 94A60 PDF BibTeX XML Cite \textit{F. Karakoç} et al., Inf. Process. Lett. 113, No. 12, 423--429 (2013; Zbl 1356.94063) Full Text: DOI
Sasaki, Yu Preimage attacks on Feistel-SP functions: impact of omitting the last network twist. (English) Zbl 1330.94048 Jacobson, Michael (ed.) et al., Applied cryptography and network security. 11th international conference, ACNS 2013, Banff, AB, Canada, June 25–28, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38979-5/pbk). Lecture Notes in Computer Science 7954, 170-185 (2013). MSC: 94A60 PDF BibTeX XML Cite \textit{Y. Sasaki}, Lect. Notes Comput. Sci. 7954, 170--185 (2013; Zbl 1330.94048) Full Text: DOI
Fouque, Pierre-Alain; Karpman, Pierre Security amplification against meet-in-the-middle attacks using whitening. (English) Zbl 1317.94105 Stam, Martijn (ed.), Cryptography and coding. 14th IMA international conference, IMACC 2013, Oxford, UK, December 17–19, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-45238-3/pbk). Lecture Notes in Computer Science 8308, 252-269 (2013). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{P.-A. Fouque} and \textit{P. Karpman}, Lect. Notes Comput. Sci. 8308, 252--269 (2013; Zbl 1317.94105) Full Text: DOI
Isobe, Takanori; Shibutani, Kyoji Generic key recovery attack on Feistel scheme. (English) Zbl 1327.94052 Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-42032-0/pbk). Lecture Notes in Computer Science 8269, 464-485 (2013). MSC: 94A60 PDF BibTeX XML Cite \textit{T. Isobe} and \textit{K. Shibutani}, Lect. Notes Comput. Sci. 8269, 464--485 (2013; Zbl 1327.94052) Full Text: DOI
Boztaş, Özkan; Karakoç, Ferhat; Çoban, Mustafa Multidimensional meet-in-the-middle attacks on reduced-round TWINE-128. (English) Zbl 1412.94157 Avoine, Gildas (ed.) et al., Lightweight cryptography for security and privacy. Second international workshop, LightSec 2013, Gebze, Turkey, May 6–7, 2013. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 8162, 55-67 (2013). MSC: 94A60 PDF BibTeX XML Cite \textit{Ö. Boztaş} et al., Lect. Notes Comput. Sci. 8162, 55--67 (2013; Zbl 1412.94157) Full Text: DOI
Canteaut, Anne; Naya-Plasencia, María; Vayssière, Bastien Sieve-in-the-middle: improved MITM attacks. (English) Zbl 1310.94135 Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 222-240 (2013). MSC: 94A60 PDF BibTeX XML Cite \textit{A. Canteaut} et al., Lect. Notes Comput. Sci. 8042, 222--240 (2013; Zbl 1310.94135) Full Text: DOI
Wang, Gaoli; Shen, Yanzhao Preimage and pseudo-collision attacks on step-reduced SM3 hash function. (English) Zbl 1315.94106 Inf. Process. Lett. 113, No. 8, 301-306 (2013). MSC: 94A60 PDF BibTeX XML Cite \textit{G. Wang} and \textit{Y. Shen}, Inf. Process. Lett. 113, No. 8, 301--306 (2013; Zbl 1315.94106) Full Text: DOI
Sasaki, Yu; Wang, Lei Comprehensive study of integral analysis on 22-round LBlock. (English) Zbl 1342.94094 Kwon, Taekyoung (ed.) et al., Information security and cryptology – ICISC 2012. 15th international conference, Seoul, Korea, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37681-8/pbk). Lecture Notes in Computer Science 7839, 156-169 (2013). MSC: 94A60 PDF BibTeX XML Cite \textit{Y. Sasaki} and \textit{L. Wang}, Lect. Notes Comput. Sci. 7839, 156--169 (2013; Zbl 1342.94094) Full Text: DOI
Rechberger, Christian On bruteforce-like cryptanalysis: new meet-in-the-middle attacks in symmetric cryptanalysis. (English) Zbl 1293.94093 Kwon, Taekyoung (ed.) et al., Information security and cryptology – ICISC 2012. 15th international conference, Seoul, Korea, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37681-8/pbk). Lecture Notes in Computer Science 7839, 33-36 (2013). MSC: 94A60 PDF BibTeX XML Cite \textit{C. Rechberger}, Lect. Notes Comput. Sci. 7839, 33--36 (2013; Zbl 1293.94093) Full Text: DOI
Lu, Jiqiang; Wei, Yongzhuang; Kim, Jongsung; Pasalic, Enes The higher-order meet-in-the-middle attack and its application to the Camellia block cipher. (English) Zbl 1295.94110 Galbraith, Steven (ed.) et al., Progress in cryptology – INDOCRYPT 2012. 13th international conference on cryptology in India, Kolkata, India, December 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34930-0/pbk). Lecture Notes in Computer Science 7668, 244-264 (2012). MSC: 94A60 PDF BibTeX XML Cite \textit{J. Lu} et al., Lect. Notes Comput. Sci. 7668, 244--264 (2012; Zbl 1295.94110) Full Text: DOI
Lu, Jiqiang; Wei, Yongzhuang; Pasalic, Enes; Fouque, Pierre-Alain Meet-in-the-middle attack on reduced versions of the Camellia block cipher. (English) Zbl 1279.94097 Hanaoka, Goichiro (ed.) et al., Advances in information and computer security. 7th international workshop on security, IWSEC 2012, Fukuoka, Japan, November 7–9, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34116-8/pbk). Lecture Notes in Computer Science 7631, 197-215 (2012). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{J. Lu} et al., Lect. Notes Comput. Sci. 7631, 197--215 (2012; Zbl 1279.94097) Full Text: DOI
Sasaki, Yu; Wang, Lei; Wu, Shuang; Wu, Wenling Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks. (English) Zbl 1292.94134 Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 562-579 (2012). MSC: 94A60 PDF BibTeX XML Cite \textit{Y. Sasaki} et al., Lect. Notes Comput. Sci. 7658, 562--579 (2012; Zbl 1292.94134) Full Text: DOI
Sangiovanni-Vincentelli, Alberto; Damm, Werner; Passerone, Roberto Taming Dr. Frankenstein: contract-based design for cyber-physical systems. (English) Zbl 1264.93152 Eur. J. Control 18, No. 3, 217-238 (2012). MSC: 93C70 93B51 93C95 PDF BibTeX XML Cite \textit{A. Sangiovanni-Vincentelli} et al., Eur. J. Control 18, No. 3, 217--238 (2012; Zbl 1264.93152) Full Text: DOI
Courtois, Nicolas T.; Gawinecki, Jerzy A.; Song, Guangyan Contradiction immunity and guess-then-determine attacks on GOST. (English) Zbl 1308.94066 Tatra Mt. Math. Publ. 53, 65-79 (2012). MSC: 94A60 68P25 90C27 PDF BibTeX XML Cite \textit{N. T. Courtois} et al., Tatra Mt. Math. Publ. 53, 65--79 (2012; Zbl 1308.94066) Full Text: DOI Link
Li, Ji; Isobe, Takanori; Shibutani, Kyoji Converting meet-in-the-middle preimage attack into pseudo collision attack: application to SHA-2. (English) Zbl 1282.94054 Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19–21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 264-286 (2012). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{J. Li} et al., Lect. Notes Comput. Sci. 7549, 264--286 (2012; Zbl 1282.94054) Full Text: DOI
Khovratovich, Dmitry; Rechberger, Christian; Savelieva, Alexandra Bicliques for preimages: attacks on Skein-512 and the SHA-2 family. (English) Zbl 1282.94049 Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19–21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 244-263 (2012). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{D. Khovratovich} et al., Lect. Notes Comput. Sci. 7549, 244--263 (2012; Zbl 1282.94049) Full Text: DOI
Wu, Shuang; Feng, Dengguo; Wu, Wenling; Guo, Jian; Dong, Le; Zou, Jian (Pseudo) preimage attack on round-reduced Grøstl hash function and others. (English) Zbl 1312.94101 Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19–21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 127-145 (2012). MSC: 94A60 PDF BibTeX XML Cite \textit{S. Wu} et al., Lect. Notes Comput. Sci. 7549, 127--145 (2012; Zbl 1312.94101) Full Text: DOI
Dinur, Itai; Dunkelman, Orr; Shamir, Adi Improved attacks on full GOST. (English) Zbl 1282.94040 Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19–21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 9-28 (2012). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{I. Dinur} et al., Lect. Notes Comput. Sci. 7549, 9--28 (2012; Zbl 1282.94040) Full Text: DOI
Zou, Jian; Wu, Wenling; Wu, Shuang; Su, Bozhan; Dong, Le Preimage attacks on step-reduced SM3 hash function. (English) Zbl 1365.94474 Kim, Howon (ed.), Information security and cryptology – ICISC 2011. 14th international conference, Seoul, Korea, November 30–December 2, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-31911-2/pbk). Lecture Notes in Computer Science 7259, 375-390 (2012). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{J. Zou} et al., Lect. Notes Comput. Sci. 7259, 375--390 (2012; Zbl 1365.94474) Full Text: DOI
Knellwolf, Simon; Khovratovich, Dmitry New preimage attacks against reduced SHA-1. (English) Zbl 1296.94126 Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 367-383 (2012). MSC: 94A60 PDF BibTeX XML Cite \textit{S. Knellwolf} and \textit{D. Khovratovich}, Lect. Notes Comput. Sci. 7417, 367--383 (2012; Zbl 1296.94126) Full Text: DOI
Chen, Jiazhe; Li, Leibo Low data complexity attack on reduced Camellia-256. (English) Zbl 1305.94037 Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9–11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 101-114 (2012). MSC: 94A60 PDF BibTeX XML Cite \textit{J. Chen} and \textit{L. Li}, Lect. Notes Comput. Sci. 7372, 101--114 (2012; Zbl 1305.94037) Full Text: DOI
Isobe, Takanori; Shibutani, Kyoji Security analysis of the lightweight block ciphers XTEA, LED and Piccolo. (English) Zbl 1291.94103 Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9–11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 71-86 (2012). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{T. Isobe} and \textit{K. Shibutani}, Lect. Notes Comput. Sci. 7372, 71--86 (2012; Zbl 1291.94103) Full Text: DOI
Sasaki, Yu; Wang, Lei; Sakai, Yasuhide; Sakiyama, Kazuo; Ohta, Kazuo Three-subset meet-in-the-middle attack on reduced XTEA. (English) Zbl 1304.94083 Mitrokotsa, Aikaterini (ed.) et al., Progress in cryptology – AFRICACRYPT 2012. 5th international conference on cryptology in Africa, Ifrane, Morocco, July 10–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31409-4/pbk). Lecture Notes in Computer Science 7374, 138-154 (2012). MSC: 94A60 PDF BibTeX XML Cite \textit{Y. Sasaki} et al., Lect. Notes Comput. Sci. 7374, 138--154 (2012; Zbl 1304.94083) Full Text: DOI
Khovratovich, Dmitry; Leurent, Gaëtan; Rechberger, Christian Narrow-bicliques: cryptanalysis of full IDEA. (English) Zbl 1297.94079 Pointcheval, David (ed.) et al., Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 392-410 (2012). MSC: 94A60 PDF BibTeX XML Cite \textit{D. Khovratovich} et al., Lect. Notes Comput. Sci. 7237, 392--410 (2012; Zbl 1297.94079) Full Text: DOI
Wang, Yanfeng; Wu, Wenling; Yu, Xiaoli Biclique cryptanalysis of reduced-round Piccolo block cipher. (English) Zbl 1292.94150 Ryan, Mark D. (ed.) et al., Information security practice and experience. 8th international conference, ISPEC 2012, Hangzhou, China, April 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29100-5/pbk). Lecture Notes in Computer Science 7232, 337-352 (2012). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{Y. Wang} et al., Lect. Notes Comput. Sci. 7232, 337--352 (2012; Zbl 1292.94150) Full Text: DOI
Fomichev, V. M. On implementation of the meet-in-the-middle attack by means of parallel computations. (Russian. English summary) Zbl 07310082 Prikl. Diskretn. Mat. 2011, No. 3(13), 116-121 (2011). MSC: 94 68 PDF BibTeX XML Cite \textit{V. M. Fomichev}, Prikl. Diskretn. Mat. 2011, No. 3(13), 116--121 (2011; Zbl 07310082) Full Text: MNR
Zhong, Jinmin; Lai, Xuejia Preimage attack on reduced DHA-256. (English) Zbl 1250.94052 JISE, J. Inf. Sci. Eng. 27, No. 4, 1315-1327 (2011). MSC: 94A60 PDF BibTeX XML Cite \textit{J. Zhong} and \textit{X. Lai}, JISE, J. Inf. Sci. Eng. 27, No. 4, 1315--1327 (2011; Zbl 1250.94052) Full Text: Link
Abdelraheem, Mohamed Ahmed; Blondeau, Céline; Naya-Plasencia, María; Videau, Marion; Zenner, Erik Cryptanalysis of ARMADILLO2. (English) Zbl 1227.94019 Lee, Dong Hoon (ed.) et al., Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 308-326 (2011). MSC: 94A60 PDF BibTeX XML Cite \textit{M. A. Abdelraheem} et al., Lect. Notes Comput. Sci. 7073, 308--326 (2011; Zbl 1227.94019) Full Text: DOI
Shibutani, Kyoji; Isobe, Takanori; Hiwatari, Harunaga; Mitsuda, Atsushi; Akishita, Toru; Shirai, Taizo Piccolo: an ultra-lightweight blockcipher. (English) Zbl 1291.94154 Preneel, Bart (ed.) et al., Cryptographic hardware and embedded systems – CHES 2011. 13th international workshop, Nara, Japan, September 28–October 1, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-23950-2/pbk). Lecture Notes in Computer Science 6917, 342-357 (2011). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{K. Shibutani} et al., Lect. Notes Comput. Sci. 6917, 342--357 (2011; Zbl 1291.94154) Full Text: DOI
Ohtahara, Chiaki; Sasaki, Yu; Shimoyama, Takeshi Preimage attacks on step-reduced RIPEMD-128 and RIPEMD-160. (English) Zbl 1295.94121 Lai, Xuejia (ed.) et al., Information security and cryptology. 6th international conference, Inscrypt 2010, Shanghai, China, October 20–24, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21517-9/pbk). Lecture Notes in Computer Science 6584, 169-186 (2011). MSC: 94A60 PDF BibTeX XML Cite \textit{C. Ohtahara} et al., Lect. Notes Comput. Sci. 6584, 169--186 (2011; Zbl 1295.94121) Full Text: DOI