Amanote Research
Register
Sign In
Meet-In-The-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
Lecture Notes in Computer Science
- Germany
doi 10.1007/978-3-642-21702-9_22
Full Text
Open PDF
Abstract
Available in
full text
Categories
Computer Science
Theoretical Computer Science
Date
January 1, 2011
Authors
Yu Sasaki
Publisher
Springer Berlin Heidelberg
Related search
Meet-In-The-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
New Preimage Attacks Against Reduced SHA-1
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Collision Attacks on AES-Based MAC: Alpha-Mac
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Miss in the Middle Attacks on IDEA and Khufu
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Design and Implementation of Hiding Techniques to Obfuscate Against Side-Channel Attacks on AES
International Journal of Computing & Network Technology
A New Zero-Watermarking Algorithm Resisting Attacks Based on Differences Hashing
Cybernetics and Information Technologies
Computer Science
A Meet-In-The-Middle Attack on Reduced-Round Crypton
Software Engineering and Applications
Sieve-In-The-Middle: Improved MITM Attacks
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Frontside Laser Fault Injection on Cryptosystems - Application to the AES' Last Round -