共 50 条
- [31] A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (04): : 1246 - 1250
- [32] Exhausting Demirci- Sel, cuk Meet-in-the-Middle Attacks Against Reduced-Round AES FAST SOFTWARE ENCRYPTION (FSE 2013), 2014, 8424 : 541 - 560
- [33] Meet-in-the-Middle Attacks on Round-Reduced Khudra SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING (SPACE 2015), 2015, 9354 : 127 - 138
- [34] Meet-in-the-Middle Attacks on Reduced-Round XTEA TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 250 - +
- [35] Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2017, 2018, 10779 : 26 - 38
- [36] On implementation of the meet-in-the-middle attack by means ofparallel computations PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2011, 13 (03): : 116 - 121
- [37] Match Box Meet-in-the-Middle Attack Against KATAN FAST SOFTWARE ENCRYPTION, FSE 2014, 2015, 8540 : 61 - 81
- [38] A new meet-in-the-middle attack on the IDEA block cipher SELECTED AREAS IN CRYPTOGRAPHY, 2004, 3006 : 117 - 129
- [39] Differential Fault Attack and Meet-in-the-Middle Attack on Block Cipher LED ADVANCES IN APPLIED SCIENCES AND MANUFACTURING, PTS 1 AND 2, 2014, 850-851 : 529 - 532