Login / Signup
Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks.
Xiaoyang Dong
Jialiang Hua
Siwei Sun
Zheng Li
Xiaoyun Wang
Lei Hu
Published in:
IACR Cryptol. ePrint Arch. (2021)
Keyphrases
</>
countermeasures
malicious attacks
traffic analysis
computer security
block cipher
attack detection
malicious users
chosen plaintext
security protocols
terrorist attacks