Author:
Sun Bing,Hai Xin,Zhang Wenyu,Cheng Lei,Yang Zhichao
Publisher
Springer Science and Business Media LLC
Reference9 articles.
1. Knudsen L R, Wagner D. Integral cryptanalysis. Lect Notes Comput Sci, 2002, 2365: 112–127
2. Daemen J, Knudsen L R, Rijmen V. The block cipher square. Lect Notes Comput Sci, 1997, 1267: 149–165
3. Lucks S. The saturation attack — a bait for Twofish. Lect Notes Comput Sci, 2002, 2355: 1–15
4. Biryukov A, Shamir A. Structural cryptanalysis of SASAS. Lect Notes Comput Sci, 2001, 2045: 394–405
5. Lai X. Higher order derivatives and differential cryptanalysis. Springer Int Ser Eng Comput Sci, 1994, 276: 227–233
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献