共 50 条
- [21] Improved key-recovery attacks on reduced-round WEM-8 Designs, Codes and Cryptography, 2022, 90 : 2419 - 2448
- [23] Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions ADVANCES IN CRYPTOLOGY - ASIACRYPT 2006, 2006, 4284 : 37 - +
- [24] Redefining Security in Shadow Cipher for IoT Nodes: New Full-Round Practical Distinguisher and the Infeasibility of Key-Recovery Attacks IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (06): : 6805 - 6817
- [25] Key-recovery Attacks on Various RO PUF Constructions via Helper Data Manipulation 2014 DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION (DATE), 2014,
- [27] Collision Attacks Against CAESAR Candidates Forgery and Key-Recovery Against AEZ and Marble ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II, 2015, 9453 : 510 - 532
- [28] Polynomial-Time Key-Recovery Attacks Against NTRUReEncrypt from ASIACCS’15 Journal of Systems Science and Complexity, 2024, 37 : 1308 - 1325