共 50 条
- [41] Distinguishing Attack and Second-Preimage Attack on Encrypted Message Authentication Codes (EMAC) PROCEEDINGS OF THE 7TH SEAMS UGM INTERNATIONAL CONFERENCE ON MATHEMATICS AND ITS APPLICATIONS 2015: ENHANCING THE ROLE OF MATHEMATICS IN INTERDISCIPLINARY RESEARCH, 2016, 1707
- [45] Second Preimage Attack on a Chaos-Based Hash Function Construction and Its Improvement CHAOS AND COMPLEX SYSTEMS, 2013, : 131 - 140
- [46] Distinguishing Attack and Second Preimage Attack on Mini-AES CBC-MAC 2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA), 2014, : 326 - 331
- [47] The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function SELECTED AREAS IN CRYPTOGRAPHY - SAC 2014, 2014, 8781 : 195 - 211
- [49] Numerical simulation and characteristic analysis of novel whirlwind supercharger Jixie Gongcheng Xuebao/Journal of Mechanical Engineering, 2010, 46 (24): : 118 - 122
- [50] Second Preimage Attack Method on Various MAC Constructions and Its Application with AES-128 2016 1ST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, INFORMATION SYSTEMS AND ELECTRICAL ENGINEERING (ICITISEE), 2016, : 37 - 42