共 50 条
- [41] Polynomial-Time Key-Recovery Attack on the NIST Specification of PROV PROGRESS IN CRYPTOLOGY, AFRICACRYPT 2024, 2024, 14861 : 222 - 235
- [43] Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-Boxes ADVANCES IN CRYPTOLOGY, PT I, 2015, 9215 : 475 - 490
- [44] Redefining Security in Shadow Cipher for IoT Nodes: New Full-Round Practical Distinguisher and the Infeasibility of Key-Recovery Attacks IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (06): : 6805 - 6817
- [45] Improving Key-Recovery in Linear Attacks: Application to 28-Round PRESENT ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT I, 2020, 12105 : 221 - 249
- [48] Improved key-recovery attacks on reduced-round WEM-8 Designs, Codes and Cryptography, 2022, 90 : 2419 - 2448
- [49] Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT III, 2021, 12827 : 278 - 308