Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 220,862,843 papers from all fields of science
Search
Sign In
Create Free Account
Meet-in-the-middle attack
Known as:
MITM
, Meet in the middle attack
, Meet-in-the-middle
The Meet-in-the-Middle attack (MITM) is a generic space–time tradeoff cryptographic attack.
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
15 relations
3-subset meet-in-the-middle attack
Baby-step giant-step
Biclique attack
Birthday attack
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
A Meet in the Middle Attack on Reduced Round Kuznyechik
Riham Altawy
,
A. Youssef
IEICE Transactions on Fundamentals of Electronics…
2015
Corpus ID: 4139327
Kuznyechik is an SPN block cipher that has been recently chosen to be standardized by the Russian federation as a new GOST cipher…
Expand
Highly Cited
2014
Highly Cited
2014
A collaborative methodology for developing a semantic model for interlinking Cancer Chemoprevention linked-data sources
Dimitris Zeginis
,
Ali Hasnain
,
Nikos Loutas
,
Helena F. Deus
,
Ronan Fox
,
K. Tarabanis
Semantic Web
2014
Corpus ID: 172363825
This paper proposes a collaborative methodology for developing semantic data models. The proposed methodology for the semantic…
Expand
2014
2014
Match Box Meet-in-the-Middle Attack Against KATAN
T. Fuhr
,
Brice Minaud
Fast Software Encryption Workshop
2014
Corpus ID: 3894885
Recent years have seen considerable interest in lightweight cryptography. One particular consequence is a renewed study of meet…
Expand
2013
2013
Meet-in-the-Middle Attacks on Reduced-Round GOST
G. Sekar
,
N. Mouha
,
B. Preneel
2013
Corpus ID: 3772296
The block cipher GOST (GOST 28147-89) is a Russian standard for encryption and message authentication that is included in OpenSSL…
Expand
2013
2013
Meet-in-the-Middle Attacks on AES
Patrick Derbez
2013
Corpus ID: 61978724
This thesis is dedicated to the cryptanalysis of the AES (Advanced Encryption Standard) which is one of the most widely deployed…
Expand
2012
2012
A Meet-in-the-Middle Attack on Reduced-Round SNAKE(2)
Li Chao
2012
Corpus ID: 63749742
SNAKE is a Feistel cipher proposed by Lee and Cha at JW-ISC 1997.It has two versions,i.e.SNAKE(1) and SNAKE(2).The security of…
Expand
2011
2011
Meet-in-the-Middle Attacks on Reduced-Round XTEA
G. Sekar
,
N. Mouha
,
V. Velichkov
,
B. Preneel
The Cryptographer's Track at RSA Conference
2011
Corpus ID: 18787776
The block cipher XTEA, designed by Needham and Wheeler, was published as a technical report in 1997. The cipher was a result of…
Expand
Highly Cited
2009
Highly Cited
2009
Improved Meet-in-the-Middle Attacks on AES
Hüseyin Demirci
,
Ihsan Taskin
,
M. Coban
,
Adnan Baysal
International Conference on Cryptology in India
2009
Corpus ID: 26753723
We improve the existing distinguishers of AES. Our work is mainly built upon the works by Gilbert& Miner [17] and Demirci…
Expand
2007
2007
A Meet-in-the-Middle Collision Attack Against the New FORK-256
Markku-Juhani O. Saarinen
IACR Cryptology ePrint Archive
2007
Corpus ID: 14898923
We show that a 2112.9 collision attack exists against the FORK-256 Hash Function. The attack is surprisingly simple compared to…
Expand
Highly Cited
2000
Highly Cited
2000
Advances in Cryptology — CRYPTO ’85 Proceedings
H. Williams
Lecture Notes in Computer Science
2000
Corpus ID: 32548450
Signatures and authentication.- Breaking the Ong-Schnorr-Shamir Signature Scheme for Quadratic Number Fields.- Another Birthday…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE