共 12 条
[1]
Dinur I, 2012, LECT NOTES COMPUT SC, V7549, P442, DOI 10.1007/978-3-642-34047-5_25
[2]
Dinur Itai, 2014, IACR CRYPTOLOGY EPRI, V2014, P259
[4]
Linear Structures: Applications to Cryptanalysis of Round-Reduced KECCAK
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I,
2016, 10031
:249-274
[5]
Conditional Cube Attack on Reduced-Round Keccak Sponge Function
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT II,
2017, 10211
:259-288
[6]
Preimage Attacks on Round-Reduced KECCAK-224/256 via an Allocating Approach
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT III,
2019, 11478
:556-584
[7]
National Institute of Standards and Technology, 2015, Sha-3 standard: Permutation-based hash and extendable-output functions, DOI DOI 10.6028/NIST.FIPS.202
[8]
Naya-Plasencia M, 2011, LECT NOTES COMPUT SC, V7107, P236
[9]
New Collision Attacks on Round-Reduced Keccak
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT III,
2017, 10212
:216-243
[10]
Non-full Sbox Linearization: Applications to Collision Attacks on Round-Reduced KECCAK
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PART II,
2017, 10402
:428-451