Skip to content
#

meet-in-the-middle

Here are 13 public repositories matching this topic...

Browser-based HiAE threat model case study — AESL, Theorem 1 candidate enumeration, MITM state recovery, byte decomposition, guess-and-determine key recovery. Security claims are contracts. The threat model is the fine print. No backends. No simulated math.

  • Updated Apr 17, 2026
  • TypeScript

Improve this page

Add a description, image, and links to the meet-in-the-middle topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the meet-in-the-middle topic, visit your repo's landing page and select "manage topics."

Learn more