共 50 条
- [41] On Related-Key Attacks and KASUMI: The Case of A5/3 PROGRESS IN CRYPTOLOGY - INDOCRYPT 2011, 2011, 7107 : 146 - +
- [42] On related-key and collision attacks: The case for the IBM 4758 cryptoprocessor INFORMATION SECURITY, PROCEEDINGS, 2004, 3225 : 111 - 122
- [44] Public Proof of Retrievability Scheme against Active Attack in Cloud Storage PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON FUTURE COMPUTER AND COMMUNICATION ENGINEERING, 2014, 111 : 29 - 32
- [45] Related-Tweak and Related-Key Differential Attacks on HALFLOOP-48 APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT III, 2024, 14585 : 355 - 377
- [46] Secure Message Authentication Against Related-Key Attack FAST SOFTWARE ENCRYPTION (FSE 2013), 2014, 8424 : 305 - 324
- [48] Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 483 - 500
- [49] On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2019, E102A (01): : 27 - 34
- [50] From Distinguishers to Key Recovery: Improved Related-Key Attacks on Even-Mansour INFORMATION SECURITY, ISC 2015, 2015, 9290 : 177 - 188