共 50 条
- [42] Memoryless Related-Key Boomerang Attack on the Full Tiger Block Cipher INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 298 - 309
- [43] Related-key rectangle attack on 36 rounds of the XTEA block cipher International Journal of Information Security, 2009, 8 : 1 - 11
- [45] Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2008, 5308 : 128 - +
- [46] On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I, 2015, 9056 : 584 - 613
- [47] The Key and IV Setup of the Stream Ciphers HC-256 and HC-128 NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 430 - 433
- [48] The (related-key) impossible boomerang attack and its application to the AES block cipher Designs, Codes and Cryptography, 2011, 60 : 123 - 143