Meet-in-the-middle attack

Known as: MITM, Meet in the middle attack, Meet-in-the-middle 
The Meet-in-the-Middle attack (MITM) is a generic space–time tradeoff cryptographic attack.
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Kuznyechik is an SPN block cipher that has been recently chosen to be standardized by the Russian federation as a new GOST cipher… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2015
2015
Kalyna is an SPN-based block cipher that was selected during Ukrainian national public cryptographic competition (2007-2010), and… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2014
2014
Recent years have seen considerable interest in lightweight cryptography. One particular consequence is a renewed study of meet… (More)
Is this relevant?
2013
2013
We propose a new type of meet-in-the-middle attack that splits a cryptographic primitive in parallel to the execution flow of the… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2013
2013
This paper describes a meet-in-the-middle (MITM) attack against the round reduced versions of the block cipher mCrypton-64/96/128… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2010
2010
In this paper, we study the meet-in-the-middle attack against block cipher ARIA. We find some new 3-round and 4-round… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2008
Highly Cited
2008
We present a 5-round distinguisher for AES. We exploit this distinguisher to develop a meet-in-the-middle attack on 7 rounds of… (More)
Is this relevant?
Highly Cited
2007
Highly Cited
2007
To date the NTRUEncrypt security parameters have been based on the existence of two types of attack: a meet-in-the-middle attack… (More)
  • figure 1
  • figure 2
Is this relevant?
2007
2007
The Data Encryption Standard (DES) is a 64-bit block cipher. Despite its short key size of 56 bits, DES continues to be used to… (More)
Is this relevant?
1990
1990
K e y words . Authentication, Digital signature, Hash function, One-way function, Meet-in-the-middle attack. 1. I n t r o d u c t… (More)
Is this relevant?