共 50 条
- [31] Improved Meet-in-the-Middle Attacks on Reduced-Round Deoxys-BC-256 COMPUTER JOURNAL, 2020, 63 (12): : 1859 - 1870
- [34] Meet-in-the-Middle Preimage Attacks on Sponge-Based Hashing ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT IV, 2023, 14007 : 158 - 188
- [35] Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT III, 2021, 12827 : 278 - 308
- [36] Memoryless Unbalanced Meet-in-the-Middle Attacks: Impossible Results and Applications APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2014, 2014, 8479 : 253 - 270
- [37] Improved Meet-in-the-Middle Attacks on Reduced-Round Kiasu-BC and Joltik-BC COMPUTER JOURNAL, 2019, 62 (12): : 1761 - 1776
- [38] Improved Meet-in-the-Middle Attacks on Reduced-Round Tweakable Block Cipher Deoxys-BC COMPUTER JOURNAL, 2022, 65 (09): : 2411 - 2420
- [39] Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE Journal of Cryptology, 2020, 33 : 1184 - 1215
- [40] Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE FAST SOFTWARE ENCRYPTION, FSE 2015, 2015, 9054 : 190 - 216