Computer Science ›› 2013, Vol. 40 ›› Issue (8): 109-114.
Previous Articles Next Articles
LIU Qing and WEI Hong-ru
[1] Kim J,Kim G,Hong S,et al.The related-key rectangle attack-application to SHACAL-1[C]∥Wang H.Proceedings of ACISP 2004,LNCS 3108.Berlin Heidelberg:Springer- Verlag,2004:33-42 [2] Wang G.Related-key rectangle attack on 43-round SHACAL-2[C]∥Dawson E,Wong D S.Proceedings of ISPEC 2007,LNCS 4464.Berlin Heidelberg:Springer-Verlag,2007:33-42 [3] 韦永壮,胡予濮.42轮SHACAL-2新的相关密钥矩形攻击[J].通信学报,2009,0(1):7-11 [4] Dunkelman O,Fleischmann E,Gorski M,et al.Related-key rectangle attack of the full HAS-160encryption mode [C]∥Roy B,Sendrier N.Proceedings of INDOCRYPT 2009,LNCS 5922.Berlin Heidelberg:Springer-Verlag,2009:157-168 [5] 韦永壮,胡予濮.简化AES-192和AES-256的相关密钥矩形新攻击[J].中国科学F辑:信息科学,2009,9(2):246-253 [6] Chang D,Hong S,Kang C,et al.ARIRANG:SHA-3proposal[EB/OL].http://csrc.nist.gov/groups/ST/hash/sha-3/Ro-und1/documents/ARIRANG.zip,2009 [7] Hong D,Kim W H,Koo B.Preimage Attack on ARIRANG[EB/OL].http://eprint.iacr.org/2009/147,2009 [8] Hong D,Koo B,Kim W H,et al.Preimage attacks on reduced steps of ARIRANG and PKC98-hash[C]∥Lee D and Hong S.Proceedings of ICISC 2009,LNCS 5984.Berlin Heidelberg:Springer-Verlag,2010:315-331 [9] Ohtahara C,Okada K,Sasaki Y,et al.Preimage Attacks on Full-ARIRANG[C]∥Parampalli U and Hawkes P.Proceedings of ACISP 2011,LNCS 6812.Berlin Heidelberg:Springer-Verlag,2011:417-422 [10] 张鹏,李瑞林,李超.对完整轮数ARIRANG加密模式的相关密钥矩形攻击[J].通信学报,2011,2(8):15-22 |
No related articles found! |
|