共 50 条
- [31] Improved Meet-in-the-Middle Attacks on Round-Reduced ARIA INFORMATION SECURITY (ISC 2013), 2015, 7807 : 155 - 168
- [32] Improved meet-in-the-middle attacks on reduced-round Piccolo Science China Information Sciences, 2018, 61
- [34] Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE Journal of Cryptology, 2020, 33 : 1184 - 1215
- [35] Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE FAST SOFTWARE ENCRYPTION, FSE 2015, 2015, 9054 : 190 - 216
- [39] Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool FAST SOFTWARE ENCRYPTION (FSE 2011), 2011, 6733 : 378 - 396
- [40] Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3 PROGRESS IN CRYPTOLOGY - LATINCRYPT 2015, 2015, 9230 : 187 - 203