共 50 条
- [41] Full Round Distinguishing and Key-Recovery Attacks on SAND-2 INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT II, 2024, 14527 : 230 - 250
- [42] Key Recovery Attack for All Parameters of HFE- POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2017, 2017, 10346 : 272 - 288
- [43] Redefining Security in Shadow Cipher for IoT Nodes: New Full-Round Practical Distinguisher and the Infeasibility of Key-Recovery Attacks IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (06): : 6805 - 6817
- [44] Efficient Key Recovery for All HFE Signature Variants ADVANCES IN CRYPTOLOGY (CRYPTO 2021), PT I, 2021, 12825 : 70 - 93
- [45] Improving Key-Recovery in Linear Attacks: Application to 28-Round PRESENT ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT I, 2020, 12105 : 221 - 249
- [48] Improved key-recovery attacks on reduced-round WEM-8 Designs, Codes and Cryptography, 2022, 90 : 2419 - 2448
- [49] Practical key recovery schemes INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 104 - 114
- [50] Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT III, 2021, 12827 : 278 - 308