The source code for the following paper:
Xiaoyang Dong and Jialiang Hua and Siwei Sun and Zheng Li and Xiaoyun Wang and Lei Hu. Meet-in-the-Middle Attacks Revisited: Key-recovery, Collision, and Preimage Attacks. CRYPTO 2021. The full version of the paper is availbable at https://eprint.iacr.org/2021/427.