Automated Meet-in-the-Middle Attacks of Hash Modes Based on Misty Structure

ZOU J, GONG M L, LIN R W, WEI J C

PDF(11294 KB)
PDF(11294 KB)
Journal of Cryptologic Research ›› 2026, Vol. 13 ›› Issue (1) : 163-178. DOI: 10.13868/j.cnki.jcr.000845
Articles

Automated Meet-in-the-Middle Attacks of Hash Modes Based on Misty Structure

    {{javascript:window.custom_author_en_index=0;}}
  • {{article.zuoZhe_EN}}
Author information +
History +

HeighLight

{{article.keyPoints_en}}

Abstract

{{article.zhaiyao_en}}

Key words

Cite this article

Download Citations
{{article.zuoZheEn_L}}. {{article.title_en}}. {{journal.qiKanMingCheng_EN}}. 2026, 13(1): 163-178 https://doi.org/10.13868/j.cnki.jcr.000845

References

References

{{article.reference}}

Funding

RIGHTS & PERMISSIONS

{{article.copyrightStatement_en}}
{{article.copyrightLicense_en}}
PDF(11294 KB)

Accesses

Citation

Detail

Sections
Recommended

/