共 20 条
- [1] Abdul-Latip SF, 2010, LECT NOTES COMPUT SC, V6047, P45, DOI 10.1007/978-3-642-12827-1_4
- [2] Ahmad, 2018, INT J COMP NETW COMM, P79, DOI DOI 10.5121/IJCNC.2018.10406
- [3] AUMASSON JP, 2009, 16 INT WORKSH FAST S, V5665, P1, DOI DOI 10.1007/978-3-642-03317-9_1
- [4] BLAHUT R E, 1994, COMMUNICATIONS CRYPT, P227, DOI [10.1007/ 978-1-4615- 2694-0_23., DOI 10.1007/978-1-4615-2694-0_23]
- [5] DINUR I, 2009, 28 ANN INT C THEOR A, V5479, P278, DOI DOI 10.1007/978-3-642-01001-9_16
- [6] Dinur I., 2009, CRYPTOLOGY, V2009, P127
- [7] Dinur I, 2011, LECT NOTES COMPUT SC, V6733, P167
- [8] Fischer S, 2008, LECT NOTES COMPUT SC, V5023, P236
- [9] Conditional Cube Attack on Reduced-Round Keccak Sponge Function [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT II, 2017, 10211 : 259 - 288
- [10] Izadi M, 2009, LECT NOTES COMPUT SC, V5888, P334, DOI 10.1007/978-3-642-10433-6_22