共 50 条
- [11] Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512 INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2010, 6047 : 1 - 18
- [12] Algebraic Attacks on Round-Reduced Keccak INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 91 - 110
- [13] Improved Differential Attack on Round-Reduced LEA INFORMATION SECURITY AND PRIVACY, ACISP 2022, 2022, 13494 : 67 - 84
- [14] Improved Linear Cryptanalysis of Round-Reduced ARIA INFORMATION SECURITY, (ISC 2016), 2016, 9866 : 18 - 34
- [15] Improved Conditional Differential Attacks on Round-Reduced Grain v1 KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (09): : 4548 - 4559
- [16] Meet-in-the-Middle Attacks on Round-Reduced Khudra SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING (SPACE 2015), 2015, 9354 : 127 - 138
- [18] Automatic Search of Attacks on Round-Reduced AES and Applications ADVANCES IN CRYPTOLOGY - CRYPTO 2011, 2011, 6841 : 169 - 187
- [19] Related-Tweakey Impossible Differential Attack on Reduced-Round SKINNY-AEAD M1/M3 TOPICS IN CRYPTOLOGY, CT-RSA 2022, 2022, 13161 : 247 - 271
- [20] Improved Differential Cryptanalysis of Round-Reduced Speck SELECTED AREAS IN CRYPTOGRAPHY - SAC 2014, 2014, 8781 : 147 - 164