Cited By
View all- Lin YSun L(2024)Related-Tweak and Related-Key Differential Attacks on HALFLOOP-48Applied Cryptography and Network Security10.1007/978-3-031-54776-8_14(355-377)Online publication date: 5-Mar-2024
- Ma SJin CShi ZCui TGuan J(2023)Correlation Attacks on SNOW-V-Like Stream Ciphers Based on a Heuristic MILP ModelIEEE Transactions on Information Theory10.1109/TIT.2023.332634870:6(4478-4491)Online publication date: 20-Oct-2023
- Ma SJin CGuan J(2023)Fast Correlation Attacks on K2 Stream CipherIEEE Transactions on Information Theory10.1109/TIT.2023.327121769:8(5426-5439)Online publication date: 1-Aug-2023
- Show More Cited By