共 9 条
[1]
[Anonymous], 2018, TERN HASH FUNCT
[2]
[Anonymous], 2011, SYMM KEY ENCR WORKSH
[3]
Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I,
2015, 9056
:733-761
[4]
Dinur I, 2012, LECT NOTES COMPUT SC, V7549, P442, DOI 10.1007/978-3-642-34047-5_25
[5]
Linear Structures: Applications to Cryptanalysis of Round-Reduced KECCAK
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I,
2016, 10031
:249-274
[6]
Li T, 2017, IACR T SYMMETRIC CRY, V2017, P39, DOI 10.13154/tosc.v2017.i4.39-57
[7]
Mouha Nicky, 2012, Information Security and Cryptology. 7th International Conference, Inscrypt 2011. Revised Selected Papers, P57, DOI 10.1007/978-3-642-34704-7_5
[8]
New Collision Attacks on Round-Reduced Keccak
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT III,
2017, 10212
:216-243
[9]
Non-full Sbox Linearization: Applications to Collision Attacks on Round-Reduced KECCAK
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PART II,
2017, 10402
:428-451