共 50 条
- [22] Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grostl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2015), 2015, 9241 : 79 - 96
- [23] Collision attack and pseudorandomness of reduced-round Camellia SELECTED AREAS IN CRYPTOGRAPHY, 2005, 3357 : 252 - 266
- [24] Improved Meet-in-the Middle Attacks on Reduced-Round TWINE-128 COMPUTER JOURNAL, 2018, 61 (08): : 1252 - 1258
- [25] Improved key-recovery attacks on reduced-round WEM-8 Designs, Codes and Cryptography, 2022, 90 : 2419 - 2448
- [28] Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round Lesamnta and SHAvite-3512 SELECTED AREAS IN CRYPTOGRAPHY, 2011, 6544 : 18 - 35
- [29] New attacks against reduced-round versions of IDEA FAST SOFTWARE ENCRYPTION, 2005, 3557 : 384 - 397
- [30] On the Indifferentiability of the Grostl Hash Function SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 88 - 105