共 50 条
- [41] New attacks against reduced-round versions of IDEA FAST SOFTWARE ENCRYPTION, 2005, 3557 : 384 - 397
- [42] Integral Attacks on Reduced-Round ARIA Block Cipher INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2010, 6047 : 19 - 29
- [43] Exhausting Demirci- Sel, cuk Meet-in-the-Middle Attacks Against Reduced-Round AES FAST SOFTWARE ENCRYPTION (FSE 2013), 2014, 8424 : 541 - 560
- [45] Meet-in-the-Middle Attacks on Reduced-Round XTEA TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 250 - +
- [46] Improved Meet-in-the-Middle Attacks on Reduced-Round Deoxys-BC-256 COMPUTER JOURNAL, 2020, 63 (12): : 1859 - 1870
- [47] Boomerang Attacks on Reduced-Round Midori64 ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 16 (02): : 191 - 203
- [48] Automated Key Recovery Attacks on Round-Reduced Orthros PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2022, 2022, 13503 : 189 - 213