共 50 条
- [42] Meet-in-the-Middle Attacks on Reduced-Round XTEA TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 250 - +
- [43] Improved Meet-in-the-Middle Attacks on Reduced-Round Deoxys-BC-256 COMPUTER JOURNAL, 2020, 63 (12): : 1859 - 1870
- [44] Boomerang Attacks on Reduced-Round Midori64 ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 16 (02): : 191 - 203
- [45] Automated Key Recovery Attacks on Round-Reduced Orthros PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2022, 2022, 13503 : 189 - 213
- [47] Quantum Linear Key-Recovery Attacks Using the QFT ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT V, 2023, 14085 : 258 - 291
- [48] A Key-Recovery Attack on 855-round Trivium ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 : 160 - 184
- [49] Practical Attacks on Reduced-Round 3D and Saturnin COMPUTER JOURNAL, 2023, 66 (02): : 479 - 495
- [50] Differential and rectangle attacks on reduced-round SHACAL-1 PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 17 - +