共 17 条
[1]
[Anonymous], LNCS
[2]
Aoki K, 2009, LECT NOTES COMPUT SC, V5912, P578, DOI 10.1007/978-3-642-10366-7_34
[3]
Brassard G., 1990, LNCS, V435
[4]
Canteaut A., 2012, LNCS, V7549
[5]
De Canniere C., 2006, LNCS, V4284, P1
[6]
Branching Heuristics in Differential Collision Search with Applications to SHA-512
[J].
FAST SOFTWARE ENCRYPTION, FSE 2014,
2015, 8540
:473-488
[7]
Gueron S., 2011, Proceedings of the 2011 Eighth International Conference on Information Technology: New Generations (ITNG), P354, DOI 10.1109/ITNG.2011.69
[8]
Indesteege S, 2009, LECT NOTES COMPUT SC, V5381, P276, DOI 10.1007/978-3-642-04159-4_18
[9]
Joux A, 2004, LECT NOTES COMPUT SC, V3152, P306
[10]
Kelsey J, 2006, LECT NOTES COMPUT SC, V4004, P183