Author:
Derbez Patrick,Fouque Pierre-Alain,Jean Jérémy
Publisher
Springer Berlin Heidelberg
Reference24 articles.
1. Aoki, K., Sasaki, Y.: Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1. In: Halevi: [19], pp. 70–89
2. Bahrak, B., Aref, M.R.: A Novel Impossible Differential Cryptanalysis of AES. In: WEWoRc (2007)
3. Biham, E., Keller, N.: Cryptanalysis of Reduced Variants of Rijndael. Tech. rep., Computer Science Department, Technion – Israel Institute of Technology (2000)
4. Biryukov, A., Dunkelman, O., Keller, N., Khovratovich, D., Shamir, A.: Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds. In: Gilbert:[17], pp. 299–319
5. Lecture Notes in Computer Science;A. Biryukov,2009
Cited by
151 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献