Keyword : meet-in-the-middle


Comprehensive Study of Integral Analysis on LBlock
Yu SASAKI Lei WANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A  No. 1 ; pp. 127-138
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Based Cryptography
Keyword: 
LBlockintegral analysispartial-summeet-in-the-middlesubkey relations
 Summary | Full Text:PDF(1.6MB)

Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
Yu SASAKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A  No. 1 ; pp. 121-130
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Functions
Keyword: 
AEShash functionDavies-MeyerMatyas-Meyer-OseasMiyaguchi-PreneelPGVpreimagemeet-in-the-middleWhirlpool
 Summary | Full Text:PDF(1.1MB)

Preimage Attacks on the Step-Reduced RIPEMD-128 and RIPEMD-160
Chiaki OHTAHARA Yu SASAKI Takeshi SHIMOYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/10/01
Vol. E95-A  No. 10 ; pp. 1729-1739
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
RIPEMD-128RIPEMD-160hashpreimagemeet-in-the-middle
 Summary | Full Text:PDF(1.9MB)

Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions RIPEMD and RIPEMD-128
Lei WANG Yu SASAKI Wataru KOMATSUBARA Kazuo SAKIYAMA Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1 ; pp. 100-110
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Function
Keyword: 
RIPEMDRIPEMD-128meet-in-the-middleone-message-word local collision
 Summary | Full Text:PDF(1.5MB)

Preimage and Second-Preimage Attacks on PGV Hashing Modes of Round-Reduced ARIA, Camellia, and Serpent
Deukjo HONG Bonwook KOO Dong-Chan KIM 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1 ; pp. 372-380
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
ARIACamelliaSerpenthash functionPGVpreimagemeet-in-the-middle
 Summary | Full Text:PDF(781.8KB)

Preimage Attack on 23-Step Tiger
Lei WANG Yu SASAKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1 ; pp. 110-120
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Function
Keyword: 
Tigerhash functionmeet-in-the-middlepreimage attackindependent chunks
 Summary | Full Text:PDF(5.8MB)