共 50 条
- [24] Automated Key Recovery Attacks on Round-Reduced Orthros PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2022, 2022, 13503 : 189 - 213
- [25] Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff COMPUTER JOURNAL, 2021, 64 (04): : 628 - 638
- [26] Meet-in-the-Middle Attacks on Round-Reduced Khudra SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING (SPACE 2015), 2015, 9354 : 127 - 138
- [27] Automatic Search of Attacks on Round-Reduced AES and Applications ADVANCES IN CRYPTOLOGY - CRYPTO 2011, 2011, 6841 : 169 - 187
- [28] Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation FAST SOFTWARE ENCRYPTION, FSE 2015, 2015, 9054 : 537 - 556