Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,122,126 papers from all fields of science
Search
Sign In
Create Free Account
Meet-in-the-middle attack
Known as:
MITM
, Meet in the middle attack
, Meet-in-the-middle
The Meet-in-the-Middle attack (MITM) is a generic space–time tradeoff cryptographic attack.
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
15 relations
3-subset meet-in-the-middle attack
Baby-step giant-step
Biclique attack
Birthday attack
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
A Practical Meet-in-the-Middle Attack on SIGABA
G. Lasry
International Conference on Historical Cryptology
2019
Corpus ID: 203979294
The SIGABA is an electromechanical en cryption device used by the US during WWII and in the 1950s. Also known as ECM Mark II…
Expand
2018
2018
Parallelizing the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack
T. Wunderer
,
Michael Burger
,
Giang Nam Nguyen
IEEE International Conference on Computational…
2018
Corpus ID: 57191464
The hybrid lattice reduction and meet-in-the-middle attack (the hybrid attack) is currently one of the most practical attacks on…
Expand
2015
2015
Extended meet-in-the-middle attacks on some Feistel constructions
Jian Guo
,
Jérémy Jean
,
I. Nikolic
,
Yu Sasaki
Designs, Codes and Cryptography
2015
Corpus ID: 4700429
We show key recovery attacks on generic balanced Feistel ciphers. The analysis is based on the meet-in-the-middle technique and…
Expand
2013
2013
Meet-in-the-Middle Attacks on Reduced-Round GOST
G. Sekar
,
N. Mouha
,
B. Preneel
2013
Corpus ID: 3772296
The block cipher GOST (GOST 28147-89) is a Russian standard for encryption and message authentication that is included in OpenSSL…
Expand
2012
2012
A Meet-in-the-Middle Attack on Reduced-Round Crypton *
Chao Liu
,
Fu-cheng Liao
,
Hongru Wei
2012
Corpus ID: 123939803
Crypton, one of AES candidates, is a 128 bit block cipher of SPN structure proposed by Lim. By means of the concept of Multiset…
Expand
2012
2012
A Meet-in-the-Middle Attack on Reduced-Round SNAKE(2)
Li Chao
2012
Corpus ID: 63749742
SNAKE is a Feistel cipher proposed by Lee and Cha at JW-ISC 1997.It has two versions,i.e.SNAKE(1) and SNAKE(2).The security of…
Expand
2012
2012
Meet-in-the-Middle Attack on Rijndael-256 Algorithm
Su Chong-mao
2012
Corpus ID: 63866271
A 5-round meet-in-the-middle distinguisher is constructed by exploiting the properties of Rijndael-256 cipher.It shows that,if…
Expand
2009
2009
Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL
Yu Sasaki
Information Security Conference
2009
Corpus ID: 11223274
We propose preimage and pseudo-preimage attacks on short output lengths of the hash function 3-pass HAVAL, which is designed to…
Expand
2007
2007
A Meet-in-the-Middle Collision Attack Against the New FORK-256
Markku-Juhani O. Saarinen
IACR Cryptology ePrint Archive
2007
Corpus ID: 14898923
We show that a 2112.9 collision attack exists against the FORK-256 Hash Function. The attack is surprisingly simple compared to…
Expand
1998
1998
Cryptanalysis of TWOPRIME
D. Coppersmith
,
D. Wagner
,
B. Schneier
,
J. Kelsey
Fast Software Encryption Workshop
1998
Corpus ID: 87901
Ding et al [DNRS97] propose a stream generator based on several layers. We present several attacks. First, we observe that the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE