共 27 条
[1]
Aumasson Jean-Philippe., 2009, ZERO SUM DISTINGUISH
[2]
Bernstein DanielJ., 2010, NIST MAILING LIST
[3]
Bertoni G., 2011, Keccak Implementation Overview-3.1
[5]
Chang D., 2014, SHA 3 WORKSH
[6]
Daemen J, 2012, LECT NOTES COMPUT SC, V7549, P422, DOI 10.1007/978-3-642-34047-5_24
[7]
Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials
[J].
FAST SOFTWARE ENCRYPTION (FSE 2013),
2014, 8424
:219-240
[8]
Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I,
2015, 9056
:733-761
[10]
Dinur I, 2012, LECT NOTES COMPUT SC, V7549, P442, DOI 10.1007/978-3-642-34047-5_25