Memoryless Unbalanced Meet-in-the-Middle Attacks: Impossible Results and Applications

Yu Sasaki. Memoryless Unbalanced Meet-in-the-Middle Attacks: Impossible Results and Applications. In Ioana Boureanu, Philippe Owesarski, Serge Vaudenay, editors, Applied Cryptography and Network Security - 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings. Volume 8479 of Lecture Notes in Computer Science, pages 253-270, Springer, 2014. [doi]

@inproceedings{Sasaki14-0,
  title = {Memoryless Unbalanced Meet-in-the-Middle Attacks: Impossible Results and Applications},
  author = {Yu Sasaki},
  year = {2014},
  doi = {10.1007/978-3-319-07536-5_16},
  url = {http://dx.doi.org/10.1007/978-3-319-07536-5_16},
  researchr = {https://researchr.org/publication/Sasaki14-0},
  cites = {0},
  citedby = {0},
  pages = {253-270},
  booktitle = {Applied Cryptography and Network Security - 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  editor = {Ioana Boureanu and Philippe Owesarski and Serge Vaudenay},
  volume = {8479},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {978-3-319-07535-8},
}