共 50 条
- [22] Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool FAST SOFTWARE ENCRYPTION (FSE 2011), 2011, 6733 : 378 - 396
- [24] Algebraic Key-Recovery Attacks on Reduced-Round Xoofff SELECTED AREAS IN CRYPTOGRAPHY, 2021, 12804 : 171 - 197
- [26] Improved Collision Attacks on the Reduced-Round Grostl Hash Function INFORMATION SECURITY, 2011, 6531 : 1 - 16
- [27] Improved meet-in-the-middle attacks on reduced-round DES PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 86 - 100
- [28] Improved meet-in-the-middle attacks on reduced-round Piccolo Science China Information Sciences, 2018, 61
- [29] Practical Attacks on Reduced-Round 3D and Saturnin COMPUTER JOURNAL, 2023, 66 (02): : 479 - 495
- [30] Differential and rectangle attacks on reduced-round SHACAL-1 PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 17 - +