共 50 条
- [32] Polynomial-Time Key-Recovery Attack on the NIST Specification of PROV PROGRESS IN CRYPTOLOGY, AFRICACRYPT 2024, 2024, 14861 : 222 - 235
- [33] Construction of high quality key-dependent S-boxes IAENG International Journal of Computer Science, 2017, 44 (03): : 337 - 344
- [34] Higher Order Side-Channel Attack Resilient S-boxes 2018 ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS, 2018, : 336 - 341
- [37] One Approach of Using Key-Dependent S-BOXes in AES MULTIMEDIA COMMUNICATIONS, SERVICES, AND SECURITY, 2011, 149 : 317 - 323
- [38] Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation IACR Transactions on Cryptographic Hardware and Embedded Systems, 2025, 2025 (01): : 367 - 391
- [39] Quantum key-recovery attack on Feistel constructions: Bernstein–Vazirani meet Grover algorithm Quantum Information Processing, 2021, 20