共 50 条
- [32] Practical Key-Recovery Attacks On Round-Reduced Ketje Jr, Xoodoo-AE And Xoodyak COMPUTER JOURNAL, 2020, 63 (08): : 1231 - 1246
- [35] New key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5 ADVANCES IN CRYPTOLOGY - EUROCRYPT 2008, 2008, 4965 : 237 - 253
- [36] Don’t Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (03): : 223 - 263
- [39] Full key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5 ADVANCES IN CRYPTOLOGY - CRYPTO 2007, PROCEEDINGS, 2007, 4622 : 13 - 30
- [40] A Polynomial Time Key-Recovery Attack on the Sidon Cryptosystem SELECTED AREAS IN CRYPTOGRAPHY, 2022, 13203 : 419 - 438