共 50 条
- [1] On the round security of symmetric-key cryptographic primitives ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 376 - 393
- [3] How to Use Metaheuristics for Design of Symmetric-Key Primitives ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT III, 2017, 10626 : 369 - 391
- [4] A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I, 2016, 9814 : 277 - 307
- [5] Gröbner Basis Attack on STARK-Friendly Symmetric-Key Primitives: JARVIS, MiMC and GMiMCerf 15th International Conference on Information Security and Cryptography, ISCTURKEY 2022 - Proceedings, 2022, : 1 - 7
- [6] Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon?s Algorithm ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 15 (01): : 83 - 95
- [8] Double Chaining Algorithm A Secure Symmetric-key Encryption Algorithm 2016 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATICS - CONCEPTS, THEORY AND APPLICATION (ICAICTA), 2016,
- [9] A general model of DPA attacks to precharged busses in symmetric-key cryptographic algorithms 2007 EUROPEAN CONFERENCE ON CIRCUIT THEORY AND DESIGN, VOLS 1-3, 2007, : 368 - 371
- [10] Specifying the needham-schroeder symmetric-key cryptographic protocol in the ambient calculus DCABES 2007 PROCEEDINGS, VOLS I AND II, 2007, : 507 - 512