Cited By
View all- Dong LZhang DLi WWu W(2024)Yoyo attack on 4-round Lai-Massey scheme with secret round functionsDesigns, Codes and Cryptography10.1007/s10623-024-01408-892:9(2655-2684)Online publication date: 1-Sep-2024
- List E(2024)Higher-Order Mixture Differentials for AES-Based Block Ciphers and Applications to TweAESAdvances in Information and Computer Security10.1007/978-981-97-7737-2_3(45-64)Online publication date: 17-Sep-2024
- Tan QFisseha YChen SBiernacki LJeannin JMalik SAustin TMeng WJensen CCremers CKirda E(2023)Security Verification of Low-Trust ArchitecturesProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616643(945-959)Online publication date: 15-Nov-2023
- Show More Cited By