Amanote Research

Amanote Research

    RegisterSign In

A Meet-In-The-Middle Attack on Reduced-Round Crypton

Software Engineering and Applications
doi 10.12677/sea.2012.12004
Full Text
Open PDF
Abstract

Available in full text

Date

January 1, 2012

Authors
超 刘
Publisher

Hans Publishers


Related search

A New Meet-In-The-Middle Attack on the IDEA Block Cipher

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2004English

(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2012English

A Hybrid Lattice-Reduction and Meet-In-The-Middle Attack Against NTRU

English

Meet-In-The-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2009English

Practical Attacks on the Round-Reduced PRINCE

IET Information Security
Computer NetworksSoftwareInformation SystemsCommunications
2017English

Boomerang Attack on Step-Reduced SHA-512

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2015English

Implementation and Improvement of the Partial Sum Attack on 6-Round AES

Lecture Notes in Electrical Engineering
IndustrialManufacturing Engineering
2015English

Collisions for Round-Reduced LAKE

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
English

Cryptanalysis of Reduced-Round MISTY

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2001English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy