Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Meet-in-the-middle attack

Known as: MITM, Meet in the middle attack, Meet-in-the-middle 
The Meet-in-the-Middle attack (MITM) is a generic space–time tradeoff cryptographic attack.
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
QARMA is a recently published lightweight tweakable block cipher, which has been used by the ARMv8 architecture to support a… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2014
2014
We show key recovery attacks on generic balanced Feistel ciphers. The analysis is based on the meet-in-the-middle technique and… Expand
  • table 1
  • figure 3
  • figure 4
Is this relevant?
2014
2014
Recent years have seen considerable interest in lightweight cryptography. One particular consequence is a renewed study of meet… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2014
Highly Cited
2014
We propose the TWEAKEY framework with goal to unify the design of tweakable block ciphers and of block ciphers resistant to… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2009
Highly Cited
2009
We improve the existing distinguishers of AES. Our work is mainly built upon the works by Gilbert& Miner [17] and Demirci… Expand
Is this relevant?
2009
2009
We present preimage attacks on the SHA-3 candidates Boole, EnRUPT, Edon-R, and Sarmal, which are found to be vulnerable against a… Expand
Is this relevant?
Highly Cited
2008
Highly Cited
2008
We present a 5-round distinguisher for AES. We exploit this distinguisher to develop a meet-in-the-middle attack on 7 rounds of… Expand
  • table 1
Is this relevant?
Highly Cited
2007
Highly Cited
2007
To date the NTRUEncrypt security parameters have been based on the existence of two types of attack: a meet-in-the-middle attack… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2007
Highly Cited
2007
The Data Encryption Standard (DES) is a 64-bit block cipher. Despite its short key size of 56 bits, DES continues to be used to… Expand
Is this relevant?
1990
1990
The meet-in-the-middle attack can be used for forging signatures on mixed-type digital signature schemes, and takes less time… Expand
  • figure 2
  • figure 3
Is this relevant?