共 50 条
- [34] Key-recovery attacks on universal hash function based MAC algorithms ADVANCES IN CRYPTOLOGY - CRYPTO 2008, PROCEEDINGS, 2008, 5157 : 144 - +
- [35] A Key-Recovery Side-Channel Attack on Classic McEliece Implementations IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (04): : 800 - 827
- [36] A Key-Recovery Attack Against Mitaka in the t-Probing Model PUBLIC-KEY CRYPTOGRAPHY - PKC 2023, PT I, 2023, 13940 : 205 - 220
- [37] Polynomial-Time Key-Recovery Attack on the NIST Specification of PROV PROGRESS IN CRYPTOLOGY, AFRICACRYPT 2024, 2024, 14861 : 222 - 235
- [38] Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-Boxes ADVANCES IN CRYPTOLOGY, PT I, 2015, 9215 : 475 - 490
- [40] Weak Keys for AEZ, and the External Key Padding Attack TOPICS IN CRYPTOLOGY - CT-RSA 2017, 2017, 10159 : 223 - 237