共 50 条
- [12] New Collision Attacks on Round-Reduced Keccak ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT III, 2017, 10212 : 216 - 243
- [13] Conditional cube attack on round-reduced River Keyak Designs, Codes and Cryptography, 2018, 86 : 1295 - 1310
- [14] Conditional Cube Key Recovery Attack on Round-Reduced Xoodyak APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2023 SATELLITE WORKSHOPS, ADSC 2023, AIBLOCK 2023, AIHWS 2023, AIOTS 2023, CIMSS 2023, CLOUD S&P 2023, SCI 2023, SECMT 2023, SIMLA 2023, 2023, 13907 : 43 - 62
- [15] Automated Key Recovery Attacks on Round-Reduced Orthros PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2022, 2022, 13503 : 189 - 213
- [16] Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff COMPUTER JOURNAL, 2021, 64 (04): : 628 - 638
- [17] Meet-in-the-Middle Attacks on Round-Reduced Khudra SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING (SPACE 2015), 2015, 9354 : 127 - 138
- [18] Automatic Search of Attacks on Round-Reduced AES and Applications ADVANCES IN CRYPTOLOGY - CRYPTO 2011, 2011, 6841 : 169 - 187
- [19] Differential-Aided Preimage Attacks On Round-Reduced Keccak COMPUTER JOURNAL, 2023, 66 (12): : 3069 - 3091