共 50 条
- [31] Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks ADVANCES IN CRYPTOLOGY - CRYPTO 2010, 2010, 6223 : 666 - 684
- [32] Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 483 - 500
- [33] On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2019, E102A (01): : 27 - 34
- [34] Public-Key Encryption Resilient Against Linear Related-Key Attacks Revisited 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 268 - 275
- [35] From Distinguishers to Key Recovery: Improved Related-Key Attacks on Even-Mansour INFORMATION SECURITY, ISC 2015, 2015, 9290 : 177 - 188
- [36] AES Variants Secure against Related-Key Differential and Boomerang Attacks INFORMATION SECURITY THEORY AND PRACTICE: SECURITY AND PRIVACY OF MOBILE DEVICES IN WIRELESS COMMUNICATION, 2011, 6633 : 191 - 207
- [37] The resistance of PRESENT-80 against related-key differential attacks Cryptography and Communications, 2014, 6 : 171 - 187
- [38] The resistance of PRESENT-80 against related-key differential attacks CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2014, 6 (03): : 171 - 187
- [39] On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2017, 2017, 10418 : 3 - 18