共 50 条
- [21] Meet-in-the-Middle Attacks on SHA-3 Candidates FAST SOFTWARE ENCRYPTION, 2009, 5665 : 228 - 245
- [22] Meet-in-the-Middle Attacks on Round-Reduced Khudra SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING (SPACE 2015), 2015, 9354 : 127 - 138
- [24] Extended meet-in-the-middle attacks on some Feistel constructions Designs, Codes and Cryptography, 2016, 80 : 587 - 618
- [26] Massive Superpoly Recovery with a Meet-in-the-Middle Framework Improved Cube Attacks on Trivium and Kreyvium ADVANCES IN CRYPTOLOGY, PT I, EUROCRYPT 2024, 2024, 14651 : 368 - 397
- [27] New Meet-in-the-Middle Attacks on FOX Block Cipher COMPUTER JOURNAL, 2023, 66 (05): : 1195 - 1212
- [28] Meet-in-the-Middle Attacks on Reduced-Round XTEA TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 250 - +
- [29] Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 : 157 - 184
- [30] Improved Meet-in-the-Middle Attacks on Nine Rounds of the AES-192 Block Cipher TOPICS IN CRYPTOLOGY, CT-RSA 2024, 2024, 14643 : 136 - 159