共 42 条
- [22] Improved Meet-in-the-Middle Attacks on Round-Reduced ARIA INFORMATION SECURITY (ISC 2013), 2015, 7807 : 155 - 168
- [23] Meet-in-the-Middle Attacks on Reduced Round Piccolo LIGHTWEIGHT CRYPTOGRAPHY FOR SECURITY AND PRIVACY, LIGHTSEC 2015, 2016, 9542 : 3 - 20
- [24] Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512 Designs, Codes and Cryptography, 2018, 86 : 721 - 741
- [26] Exhausting Demirci- Sel, cuk Meet-in-the-Middle Attacks Against Reduced-Round AES FAST SOFTWARE ENCRYPTION (FSE 2013), 2014, 8424 : 541 - 560
- [27] Meet-in-the-Middle Attacks on Round-Reduced Khudra SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING (SPACE 2015), 2015, 9354 : 127 - 138
- [28] Improved Meet-in-the Middle Attacks on Reduced-Round TWINE-128 COMPUTER JOURNAL, 2018, 61 (08): : 1252 - 1258
- [29] Related-tweakey impossible differential attack on reduced-round Deoxys-BC-256 Science China Information Sciences, 2019, 62