共 50 条
- [34] Meet-in-the-middle attacks on 10-round AES-256 Designs, Codes and Cryptography, 2016, 80 : 459 - 471
- [35] Meet-in-the-Middle Attacks on SHA-3 Candidates FAST SOFTWARE ENCRYPTION, 2009, 5665 : 228 - 245
- [36] Improved Meet-in-the-Middle Attacks on AES PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 144 - 156
- [37] Preimage Attacks on Reduced-Round Stribog PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014, 2014, 8469 : 109 - 125
- [38] Meet-in-the-middle attacks on FOX block cipher Tongxin Xuebao/Journal on Communications, 2016, 37 (08): : 185 - 190
- [39] Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE FAST SOFTWARE ENCRYPTION, FSE 2015, 2015, 9054 : 3 - 27
- [40] Meet-in-the-Middle Attacks on Generic Feistel Constructions ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 458 - 477