Improved Meet-in-the-Middle Cryptanalysis on Kupyna
Abstract
References
Index Terms
- Improved Meet-in-the-Middle Cryptanalysis on Kupyna
Recommendations
Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks
Advances in Cryptology – CRYPTO 2021AbstractAt EUROCRYPT 2021, Bao et al. proposed an automatic method for systematically exploring the configuration space of meet-in-the-middle (MITM) preimage attacks. We further extend it into a constraint-based framework for finding exploitable MITM ...
Cryptanalysis of the Round-Reduced GOST Hash Function
Information Security and CryptologyAbstractThe GOST hash function, defined in GOST R 34.11-2012, was selected as the new Russian standard on August 7, 2012. It is designed to replace the old Russian standard GOST R 34.11-94. The GOST hash function is an AES-based primitive and is ...
Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE
Advances in Cryptology -- CRYPTO 2015AbstractAt CRYPTO 2012, Knellwolf and Khovratovich presented a differential formulation of advanced meet-in-the-middle techniques for preimage attacks on hash functions. They demonstrated the usefulness of their approach by significantly improving the ...
Comments
Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 12Total Downloads
- Downloads (Last 12 months)12
- Downloads (Last 6 weeks)5
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format