共 50 条
- [31] Differential-Aided Preimage Attacks On Round-Reduced Keccak COMPUTER JOURNAL, 2023, 66 (12): : 3069 - 3091
- [32] Analysis of Two Attacks on Reduced-Round Versions of the SMS4 INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2008, 5308 : 141 - +
- [33] Higher Order Differential Attacks on Reduced-Round MISTY1 INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2008, 2009, 5461 : 415 - +
- [34] Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 171 - 190
- [35] Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3 PROGRESS IN CRYPTOLOGY - LATINCRYPT 2015, 2015, 9230 : 187 - 203
- [37] Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grostl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2015), 2015, 9241 : 79 - 96
- [39] Improved preimage attacks on hash modes of 8-round AES-256 Multimedia Tools and Applications, 2016, 75 : 14525 - 14539
- [40] Improved Meet-in-the Middle Attacks on Reduced-Round TWINE-128 COMPUTER JOURNAL, 2018, 61 (08): : 1252 - 1258