Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Automated Meet-in-the-Middle Attack Goes to Feistel

    Feistel network and its generalizations (GFN) are another important building blocks for constructing hash functions, e.g., Simpira v2, Areion, and the ISO standard Lesamnta-LW. The Meet-in-the-Middle (MitM) is a ...

    Qingliang Hou, **aoyang Dong, Lingyue Qin in Advances in Cryptology – ASIACRYPT 2023 (2023)