共 28 条
[1]
[Anonymous], 2009, RUMP SESS CRYPT HARD
[2]
[Anonymous], 2011, The keccak reference
[3]
[Anonymous], 2011, SUBMISSION NIST ROUN
[4]
[Anonymous], 1995, Cipher and hash function design strategies based on linear and differential cryptanalysis
[5]
Bertoni G., 2015, KECCAKTOOLS
[6]
Bertoni G., Keccak crunchy crypto collision and pre-image contest
[7]
Canteaut A., 2012, LECT NOTES COMPUTER, V7549
[8]
Daemen J, 2012, LECT NOTES COMPUT SC, V7549, P422, DOI 10.1007/978-3-642-34047-5_24
[9]
Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials
[J].
FAST SOFTWARE ENCRYPTION (FSE 2013),
2014, 8424
:219-240
[10]
Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I,
2015, 9056
:733-761