共 50 条
- [21] Meet-in-the-middle attacks on 10-round AES-256 Designs, Codes and Cryptography, 2016, 80 : 459 - 471
- [22] Exhausting Demirci- Sel, cuk Meet-in-the-Middle Attacks Against Reduced-Round AES FAST SOFTWARE ENCRYPTION (FSE 2013), 2014, 8424 : 541 - 560
- [24] Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE ADVANCES IN CRYPTOLOGY, PT I, 2015, 9215 : 683 - 701
- [25] Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 214 - 231
- [27] Improved meet-in-the-middle attacks on reduced-round DES PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 86 - 100
- [28] Improved Meet-in-the-Middle Attacks on Round-Reduced ARIA INFORMATION SECURITY (ISC 2013), 2015, 7807 : 155 - 168
- [29] Improved meet-in-the-middle attacks on reduced-round Piccolo Science China Information Sciences, 2018, 61
- [30] Quantum Demiric-Selcuk Meet-in-the-Middle Attacks on Reduced-Round AES International Journal of Theoretical Physics, 2022, 61