搜索结果: 1-2 共查到“mCrypton”相关记录2条 . 查询时间(0.086 秒)
A Meet-in-the-middle Attack on Round-Reduced mCrypton
Efficient Differential Enumeration Technique Key Bridging Tchnique
2014/3/6
The meet-in-the-middle (MITM) attack on AES is a great success. In this paper, we apply the method to the lightweight SPN block cipher mCrypton.
We prove that the multiset technique used to analyze A...
Non-isomorphic Biclique Cryptanalysis and Its Application to Full-Round mCrypton
Biclique cryptanalysis Asymmetric key partitioning Non-isomorphic bicliques Block ciphers mCrypton
2013/4/18
Biclique attack, is a new cryptanalytic technique which brings new tools from the area of hash functions to the area of block cipher cryptanalysis. Till now, this technique is the only one able to ana...