Practical Rebound Attack on 12-Round Cheetah-256
暂无分享,去创建一个
[1] Vincent Rijmen,et al. Rebound Distinguishers: Results on the Full Whirlpool Compression Function , 2009, ASIACRYPT.
[2] Florian Mendel,et al. Cryptanalysis of Twister , 2009, ACNS.
[3] Thomas Peyrin,et al. Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher , 2009, Selected Areas in Cryptography.
[4] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.
[5] Shuang Wu,et al. Cryptanalysis of the LANE Hash Function , 2009, Selected Areas in Cryptography.
[6] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[7] Florian Mendel,et al. The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl , 2009, FSE.