Probability to meet in the middle

25Citations
Citations of this article
34Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper proposes "Matching Models A, B, and C" for the meet-in-the-middle attacks against a message with digital signature to provide a more sound foundation for the calculation of the probability of success. The typical procedures by Yuval and by Merkle are regarded as Model A or "birthday paradox in two groups," and are different from the classical birthday paradox. Models B and C are applicable for other similar procedures. The relationship of Matching Models and probabilistic models for testing the algebraic structure of DES is also discussed. © 1990 International Association for Cryptologic Research.

Cite

CITATION STYLE

APA

Nishimura, K., & Sibuya, M. (1990). Probability to meet in the middle. Journal of Cryptology, 2(1), 13–22. https://doi.org/10.1007/BF02252867

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free