共 33 条
- [21] Improved Single-Key Attacks on 9-Round AES-192/256 [J]. FAST SOFTWARE ENCRYPTION, FSE 2014, 2015, 8540 : 127 - 146
- [22] Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia [J]. FAST SOFTWARE ENCRYPTION, FSE 2015, 2015, 9054 : 48 - 70
- [23] Meet-in-the-middle attacks on 10-round AES-256 [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2016, 80 (03) : 459 - 471
- [24] Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE [J]. FAST SOFTWARE ENCRYPTION (FSE 2016), 2016, 9783 : 247 - 267
- [25] New Impossible Differential Search Tool from Design and Cryptanalysis Aspects Revealing Structural Properties of Several Ciphers [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT III, 2017, 10212 : 185 - 215
- [26] Shi D., 2018, LNCS, V1273, P3, DOI [10.1007/978-3-030, DOI 10.1007/978-3-030]
- [27] Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II, 2019, 11693 : 180 - 209
- [28] Sun SW, 2017, IACR T SYMMETRIC CRY, V2017, P281, DOI 10.13154/tosc.v2017.i1.281-306
- [29] Sun SW, 2014, LECT NOTES COMPUT SC, V8873, P158, DOI 10.1007/978-3-662-45611-8_9
- [30] Wang L, 2014, INT J BIOCHEM CELL B, V54, P1, DOI 10.1016/j.biocel.2014.06.008