Amanote Research
Register
Sign In
A Meet-In-The-Middle Attack on Reduced-Round Crypton
Software Engineering and Applications
doi 10.12677/sea.2012.12004
Full Text
Open PDF
Abstract
Available in
full text
Date
January 1, 2012
Authors
超 刘
Publisher
Hans Publishers
Related search
A New Meet-In-The-Middle Attack on the IDEA Block Cipher
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
A Hybrid Lattice-Reduction and Meet-In-The-Middle Attack Against NTRU
Meet-In-The-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Practical Attacks on the Round-Reduced PRINCE
IET Information Security
Computer Networks
Software
Information Systems
Communications
Boomerang Attack on Step-Reduced SHA-512
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Implementation and Improvement of the Partial Sum Attack on 6-Round AES
Lecture Notes in Electrical Engineering
Industrial
Manufacturing Engineering
Collisions for Round-Reduced LAKE
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Cryptanalysis of Reduced-Round MISTY
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science