Semantic Scholar uses AI to extract papers important to this topic.
QARMA is a recently published lightweight tweakable block cipher, which has been used by the ARMv8 architecture to support a… Expand We show key recovery attacks on generic balanced Feistel ciphers. The analysis is based on the meet-in-the-middle technique and… Expand Recent years have seen considerable interest in lightweight cryptography. One particular consequence is a renewed study of meet… Expand This paper presents an improved single-key attack on a block-cipher XTEA by using the three-subset meet-in-the-middle (MitM… Expand We improve the existing distinguishers of AES. Our work is mainly built upon the works by Gilbert& Miner  and Demirci… Expand We present preimage attacks on the SHA-3 candidates Boole, EnRUPT, Edon-R, and Sarmal, which are found to be vulnerable against a… Expand We present a 5-round distinguisher for AES. We exploit this distinguisher to develop a meet-in-the-middle attack on 7 rounds of… Expand To date the NTRUEncrypt security parameters have been based on the existence of two types of attack: a meet-in-the-middle attack… Expand The Data Encryption Standard (DES) is a 64-bit block cipher. Despite its short key size of 56 bits, DES continues to be used to… Expand The meet-in-the-middle attack can be used for forging signatures on mixed-type digital signature schemes, and takes less time… Expand