Meet-in-the-middle attack/Related Articles: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Chris Day
(New page: {{subpages}} <!-- INSTRUCTIONS, DELETE AFTER READING: Related Articles pages link to existing and proposed articles that are related to the present article. These lists of links double as...)
 
imported>Chris Day
(I'm not sure where these all fit so I am putting them all under other related topics)
Line 7: Line 7:


==Parent topics==
==Parent topics==
{{r|cryptanalysis}}
{{r|Cryptanalysis}}


==Subtopics==
==Subtopics==
Line 13: Line 13:


==Other related topics==
==Other related topics==
<!-- List topics here that are related to this topic, but neither wholly include it nor are wholly included by it. -->
{{r|Code book attack}}
{{r|Passive attack}}
{{r|Active attack}}
{{r|Block cipher}}
{{r|Hashed message authentication code}}
{{r|Birthday coincidence}}
{{r|Birthday attack}}
{{r|Cryptographic hash}}
{{r|Ciphers}}
{{r|Hash (cryptography)}}

Revision as of 00:04, 2 November 2008

This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
A list of Citizendium articles, and planned articles, about Meet-in-the-middle attack.
See also changes related to Meet-in-the-middle attack, or pages that link to Meet-in-the-middle attack or to this page or whose text contains "Meet-in-the-middle attack".


Parent topics

  • Cryptanalysis [r]: The sub-field of cryptology which deals with breaking into existing codes and ciphers. [e]

Subtopics

Other related topics