共 50 条
- [41] Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2 FAST SOFTWARE ENCRYPTION (FSE 2012), 2012, 7549 : 264 - 286
- [42] Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE Journal of Cryptology, 2020, 33 : 1184 - 1215
- [43] Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE FAST SOFTWARE ENCRYPTION, FSE 2015, 2015, 9054 : 190 - 216
- [45] Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3 PROGRESS IN CRYPTOLOGY - LATINCRYPT 2015, 2015, 9230 : 187 - 203
- [48] Meet-in-the-middle attacks on 10-round AES-256 Designs, Codes and Cryptography, 2016, 80 : 459 - 471
- [49] Differential Meet-In-The-Middle Cryptanalysis ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT III, 2023, 14083 : 240 - 272
- [50] Meet-in-the-middle Cryptanalysis of IVLBC 2024 IEEE TENTH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND ELECTRONICS, ICCE 2024, 2024, : 445 - 450