共 23 条
[1]
A Framework for Automated Independent-Biclique Cryptanalysis
[J].
FAST SOFTWARE ENCRYPTION (FSE 2013),
2014, 8424
:561-581
[3]
Biham E, 2006, LECT NOTES COMPUT SC, V3860, P21
[4]
Biryukov A, 2010, LECT NOTES COMPUT SC, V6110, P299
[5]
Biryukov A, 2009, LECT NOTES COMPUT SC, V5912, P1, DOI 10.1007/978-3-642-10366-7_1
[6]
Biryukov A, 2009, LECT NOTES COMPUT SC, V5677, P231, DOI 10.1007/978-3-642-03356-8_14
[7]
Bogdanov Andrey, 2015, Information Security and Cryptology - ICISC 2014. 17th International Conference. Revised Selected Papers: LNCS 8949, P160, DOI 10.1007/978-3-319-15943-0_10
[8]
Bogdanov A., 2012, ECRYPT WORKSH SHARCS
[9]
Bogdanov A, 2011, LECT NOTES COMPUT SC, V7073, P344, DOI 10.1007/978-3-642-25385-0_19
[10]
Canteaut A, 2013, LECT NOTES COMPUT SC, V8042, P222, DOI 10.1007/978-3-642-40041-4_13