共 50 条
- [31] Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation IACR Transactions on Cryptographic Hardware and Embedded Systems, 2025, 2025 (01): : 367 - 391
- [32] Speeding Up Preimage and Key-Recovery Attacks with Highly Biased Differential-Linear Approximations ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT IV, 2024, 14923 : 73 - 104
- [34] Practical Key-Recovery Attacks On Round-Reduced Ketje Jr, Xoodoo-AE And Xoodyak COMPUTER JOURNAL, 2020, 63 (08): : 1231 - 1246
- [37] Full Key-Recovery Attack on the HMAC/NMAC Based on 3 and 4-Pass HAVAL INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 285 - +
- [38] New key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5 ADVANCES IN CRYPTOLOGY - EUROCRYPT 2008, 2008, 4965 : 237 - 253
- [39] Don’t Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (03): : 223 - 263