Cited By
View all- Kim HKim DYi OKim J(2019)Cryptanalysis of hash functions based on blockciphers suitable for IoT service platform securityMultimedia Tools and Applications10.1007/s11042-018-5630-478:3(3107-3130)Online publication date: 1-Feb-2019
- Dinur IGoldwasser SLin HRoughgarden T(2015)The Computational Benefit of Correlated InstancesProceedings of the 2015 Conference on Innovations in Theoretical Computer Science10.1145/2688073.2688082(219-228)Online publication date: 11-Jan-2015
- Isobe TShibutani K(2013)Generic Key Recovery Attack on Feistel SchemePart I of the Proceedings of the 19th International Conference on Advances in Cryptology - ASIACRYPT 2013 - Volume 826910.1007/978-3-642-42033-7_24(464-485)Online publication date: 1-Dec-2013
- Show More Cited By