共 50 条
- [21] Improved meet-in-the-middle attack on reduced-round Kiasu-BC algorithm Tongxin Xuebao/Journal on Communications, 2022, 43 (07): : 41 - 48
- [22] Meet-in-the-middle Attack on RAIN-128 Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2024, 46 (01): : 327 - 334
- [23] A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique NETWORK AND SYSTEM SECURITY, 2014, 8792 : 166 - 183
- [28] The parallel-cut meet-in-the-middle attack CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2015, 7 (03): : 331 - 345
- [29] Meet-in-the-Middle and Impossible Differential Fault Analysis on AES CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2011, 2011, 6917 : 274 - +
- [30] A real-world attack of 8-round CLEFIA Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2011, 39 (07): : 1608 - 1612