Cryptology ePrint Archive: Report 2021/427

Available versions in chronological order


Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks
Xiaoyang Dong and Jialiang Hua and Siwei Sun and Zheng Li and Xiaoyun Wang and Lei Hu

Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks
Xiaoyang Dong and Jialiang Hua and Siwei Sun and Zheng Li and Xiaoyun Wang and Lei Hu

Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks
Xiaoyang Dong and Jialiang Hua and Siwei Sun and Zheng Li and Xiaoyun Wang and Lei Hu

Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks
Xiaoyang Dong and Jialiang Hua and Siwei Sun and Zheng Li and Xiaoyun Wang and Lei Hu

Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks
Xiaoyang Dong and Jialiang Hua and Siwei Sun and Zheng Li and Xiaoyun Wang and Lei Hu

Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks
Xiaoyang Dong and Jialiang Hua and Siwei Sun and Zheng Li and Xiaoyun Wang and Lei Hu
Original publication (with major differences): IACR-CRYPTO-2021

Meet-in-the-Middle Attacks Revisited: Key-recovery, Collision, and Preimage Attacks
Xiaoyang Dong and Jialiang Hua and Siwei Sun and Zheng Li and Xiaoyun Wang and Lei Hu
Original publication (with major differences): IACR-CRYPTO-2021

Meet-in-the-Middle Attacks Revisited: Key-recovery, Collision, and Preimage Attacks
Xiaoyang Dong and Jialiang Hua and Siwei Sun and Zheng Li and Xiaoyun Wang and Lei Hu
Original publication (with major differences): IACR-CRYPTO-2021


[ Cryptology ePrint archive ]