共 50 条
- [41] Improved preimage and pseudo-collision attacks on SM3 hash function Tongxin Xuebao/Journal on Communications, 2018, 39 (01): : 46 - 55
- [42] A new related-key square attack on 7-round and 8-round AES-192 CHINESE JOURNAL OF ELECTRONICS, 2008, 17 (01): : 145 - 149
- [43] Security Evaluation of Double-Block-Length Hash Modes with Preimage Attacks on PGV Schemes JOURNAL OF INTERNET TECHNOLOGY, 2013, 14 (03): : 497 - 508
- [44] Key Structures: Improved Related-Key Boomerang Attack Against the Full AES-256 INFORMATION SECURITY AND PRIVACY, ACISP 2022, 2022, 13494 : 3 - 23
- [45] Improved Collision Attacks on the Reduced-Round Grostl Hash Function INFORMATION SECURITY, 2011, 6531 : 1 - 16
- [46] Improved Meet-in-the-Middle Attacks on Reduced-Round Deoxys-BC-256 COMPUTER JOURNAL, 2020, 63 (12): : 1859 - 1870
- [47] Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512 Designs, Codes and Cryptography, 2018, 86 : 721 - 741
- [49] Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 : 185 - 212