共 27 条
[1]
Aaram Yun, 2005, Information Security and Cryptology - ICISC 2005. 8th International Conference. Revised Selected Papers (Lecture Notes in Computer Science Vol. 3935), P146
[2]
[Anonymous], 1997, Handbook of Applied Cryptography
[3]
Aoki K., 2008, LNCS, P103, DOI DOI 10.1007/978-3-642-04159-4
[4]
Biham E, 2005, LECT NOTES COMPUT SC, V3494, P36
[5]
Cho HS, 2006, LECT NOTES COMPUT SC, V4296, P286
[6]
Deukjo Hong, 2009, Information Security and Cryptology, ICISC 2009. 12th International Conference, ICISC 2009. Revised Selected Papers, P332
[8]
Dobbertin H., 1996, Fast Software Encryption. Third International Workshop Proceedings, P71
[9]
Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE
[J].
ADVANCES IN CRYPTOLOGY, PT I,
2015, 9215
:683-701
[10]
Guo J, 2010, LECT NOTES COMPUT SC, V6477, P56, DOI 10.1007/978-3-642-17373-8_4