Search
Search Results
-
Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework
Computer aided cryptanalysis has been popular for recent several years, however, most of these automations are semi-automations which leave...
-
Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher
Meet-in-the-middle (MitM) attack method has led to the best currently published cryptanalytic results on the AES block cipher in the single-key...
-
Automated Meet-in-the-Middle Attack Goes to Feistel
Feistel network and its generalizations (GFN) are another important building blocks for constructing hash functions, e.g., Simpira v2, Areion, and... -
Differential Meet-In-The-Middle Cryptanalysis
In this paper we introduce the differential meet-in-the-middle framework, a new cryptanalysis technique for symmetric primitives. Our new... -
Improved Differential Meet-in-the-Middle Cryptanalysis
In this paper, we extend the applicability of differential meet-in-the-middle attacks, proposed at Crypto 2023, to truncated differentials, and in... -
Algebraic Meet-in-the-Middle Attack on LowMC
By exploiting the feature of partial nonlinear layers, we propose a new technique called algebraic meet-in-the-middle (MITM) attack to analyze the... -
Revisiting Meet-in-the-Middle Cryptanalysis of SIDH/SIKE with Application to the $IKEp182 Challenge
This work focuses on concrete cryptanalysis of the isogeny-based cryptosystems SIDH/SIKE under realistic memory/storage constraints. More precisely,... -
Meet-in-the-Middle Preimage Attacks on Sponge-Based Hashing
The Meet-in-the-Middle (MitM) attack has been widely applied to preimage attacks on Merkle-Damgård (MD) hashing. In this paper, we introduce a... -
Meet-in-the-middle attacks on AES with value constraints
In meet-in-the-middle (MITM) attacks, the sizes of the precomputation tables determine the effectiveness. In this paper, value constraints are...
-
Massive Superpoly Recovery with a Meet-in-the-Middle Framework
The cube attack extracts the information of secret key bits by recovering the coefficient called superpoly in the output bit with respect to a subset... -
Improved Meet-in-the-Middle Attacks on Nine Rounds of the AES-192 Block Cipher
In the single-key attack scenario, meet-in-the-middle (MitM) attack method has led to the best currently published cryptanalytic results on the AES... -
Exploiting Non-full Key Additions: Full-Fledged Automatic Demirci-Selçuk Meet-in-the-Middle Cryptanalysis of SKINNY
The Demirci-Selçuk meet-in-the-middle (DS-MITM) attack is a sophisticated variant of differential attacks. Due to its sophistication, it is hard to... -
Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Hashing
The Meet-in-the-Middle approach is one of the most powerful cryptanalysis techniques, demonstrated by its applications in preimage attacks on the... -
Improved Hybrid Attack via Error-Splitting Method for Finding Quinary Short Lattice Vectors
Plenty of lattice-based cryptosystems use ternary or quinary sparse short vectors to accelerate the computing procedure. The hybrid attack, proposed... -
Fault Attack on SQIsign
In this paper, we introduce the first fault attack on SQIsign. By injecting a fault into the ideal generator during the commitment phase, we... -
Adversarial attack algorithm for traffic sign recognition
Deep learning suffers from the threat of adversarial attacks, and its defense methods have become a research hotspot. In all applications of deep...
-
Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks
At EUROCRYPT 2021, Bao et al. proposed an automatic method for systematically exploring the configuration space of meet-in-the-middle (MITM) preimage... -
Hybrid Dual and Meet-LWE Attack
The Learning with Errors (LWE) problem is one of the most prominent problems in lattice-based cryptography. Many practical LWE-based schemes,... -
A stealthy and robust backdoor attack via frequency domain transform
Deep learning models are vulnerable to backdoor attacks, where an adversary aims to inject a hidden backdoor into the deep learning models, such that...
-
Yoyo attack on 4-round Lai-Massey scheme with secret round functions
In this study, we present the first yoyo attack to recover the secret round function of the 4-round Lai-Massey scheme with an affine orthomorphism....