共 50 条
- [21] Meet-in-the-Middle Attacks on Round-Reduced Khudra SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING (SPACE 2015), 2015, 9354 : 127 - 138
- [23] Improved Meet-in-the Middle Attacks on Reduced-Round TWINE-128 COMPUTER JOURNAL, 2018, 61 (08): : 1252 - 1258
- [24] Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE Journal of Cryptology, 2020, 33 : 1184 - 1215
- [25] Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE FAST SOFTWARE ENCRYPTION, FSE 2015, 2015, 9054 : 190 - 216
- [27] A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (04): : 1246 - 1250
- [28] Improved Meet-in-the-Middle Attacks on AES PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 144 - 156