Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by 超 刘
A Meet-In-The-Middle Attack on Reduced-Round Crypton
Software Engineering and Applications
地铁深基坑围护结构地下连续墙侧向成槽施工技术
工程技术研究
Related publications
A New Meet-In-The-Middle Attack on the IDEA Block Cipher
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
A Hybrid Lattice-Reduction and Meet-In-The-Middle Attack Against NTRU
Meet-In-The-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Practical Attacks on the Round-Reduced PRINCE
IET Information Security
Computer Networks
Software
Information Systems
Communications
Boomerang Attack on Step-Reduced SHA-512
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Implementation and Improvement of the Partial Sum Attack on 6-Round AES
Lecture Notes in Electrical Engineering
Industrial
Manufacturing Engineering
Collisions for Round-Reduced LAKE
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Cryptanalysis of Reduced-Round MISTY
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science