共 42 条
[1]
Aiello W, 1996, LECT NOTES COMPUT SC, V1070, P307
[2]
[Anonymous], 2002, TOPICS CRYPTOLGY CT, DOI DOI 10.1007/3-540-45760-7
[3]
Baignères T, 2007, LECT NOTES COMPUT SC, V4876, P184
[4]
Bellarc M, 2009, LECT NOTES COMPUT SC, V5867, P295, DOI 10.1007/978-3-642-05445-7_19
[5]
Bellare M., 2010, ADDENDUM FFX M UNPUB
[6]
Message-Recovery Attacks on Feistel-Based Format Preserving Encryption
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:444-455
[7]
Brightwell M., 1997, 20 NISSC P, P141
[9]
Desai A, 2000, LECT NOTES COMPUT SC, V1976, P503
[10]
Dworkin M., 2016, NIST SPECIAL PUBLICA, V800