共 50 条
- [22] Meet-in-the-Middle Attacks on SHA-3 Candidates FAST SOFTWARE ENCRYPTION, 2009, 5665 : 228 - 245
- [23] Meet-in-the-Middle Attacks on Round-Reduced Khudra SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING (SPACE 2015), 2015, 9354 : 127 - 138
- [25] Extended meet-in-the-middle attacks on some Feistel constructions Designs, Codes and Cryptography, 2016, 80 : 587 - 618
- [27] New Meet-in-the-Middle Attacks on FOX Block Cipher COMPUTER JOURNAL, 2023, 66 (05): : 1195 - 1212
- [28] Improved Meet-in-the-Middle Attacks on Generic Feistel Constructions IEEE ACCESS, 2019, 7 : 34416 - 34424
- [29] Meet-in-the-Middle Attacks on Reduced-Round XTEA TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 250 - +
- [30] Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 : 157 - 184