[1] |
Manman LI, Shaozhen CHEN.
Improved meet-in-the-middle attack on reduced-round Kiasu-BC algorithm
[J]. Journal on Communications, 2022, 43(7): 41-48.
|
[2] |
Xiaoyan ZHANG, Zhihao LIU, Xiaofeng DU, Tianbo LU.
Research on a real-time receiving scheme of streaming data
[J]. Journal on Communications, 2022, 43(4): 154-163.
|
[3] |
Anqi YIN, Yuanbo GUO, Ding WANG, Tongzhou QU, Lin CHEN.
Provably secure quantum resistance two-server password-authenticated key exchange protocol
[J]. Journal on Communications, 2022, 43(3): 14-29.
|
[4] |
Jian ZOU,Le DONG.
Improved preimage and pseudo-collision attacks on SM3 hash function
[J]. Journal on Communications, 2018, 39(1): 46-55.
|
[5] |
Zhi-bo DU,Zhen WU,Min WANG,Jin-tao RAO.
Power analysis attack of dynamic password token based on SM3
[J]. Journal on Communications, 2017, 38(3): 65-72.
|
[6] |
Zhen WU,Min WANG,Jin-tao RAO,Zhi-bo DU,Sheng WANG,Ling-hao ZHANG.
Mutual information power analysis attack of HMAC based on SM3
[J]. Journal on Communications, 2016, 37(Z1): 57-62.
|
[7] |
Shi-Wei CHEN,INChen-Hui J.
Trojan message attack on the concatenated hash functions
[J]. Journal on Communications, 2016, 37(8): 45-50.
|
[8] |
IRong-jia L,INChen-hui J.
Meet-in-the-middle attacks on FOX block cipher
[J]. Journal on Communications, 2016, 37(8): 185-190.
|
[9] |
Zhi-bo DU,Zhen WU,Min WANG,Jin-tao RAO.
Power analysis attack of HMAC based on SM3
[J]. Journal on Communications, 2016, 37(5): 38-43.
|
[10] |
Jiong-jiong REN,Shao-zhen CHEN.
Meet-in-the-middle attack on 11-round 3D cipher
[J]. Journal on Communications, 2015, 36(8): 182-191.
|
[11] |
Man-man LI,Shao-zhen CHEN.
Improved meet-in-the-middle attack on ARIA cipher
[J]. Journal on Communications, 2015, 36(3): 89-94.
|
[12] |
Ping ZHANG,Yan-bing LIU,Jing YU,Jian-long TAN.
HashTrie:a space-efficient multiple string matching algorithm
[J]. Journal on Communications, 2015, 36(10): 172-180.
|
[13] |
Ya-fei ZHENG,Hong-ru WEI.
3-subset meet-in-the-middle attack on block cipher TWIS
[J]. Journal on Communications, 2014, 35(6): 180-184.
|
[14] |
.
3-subset meet-in-the-middle attack on block cipher TWIS
[J]. Journal on Communications, 2014, 35(6): 23-184.
|
[15] |
.
Preimage and pseudo-collision attacks on 29-step
SM3 hash function with padding
[J]. Journal on Communications, 2014, 35(2): 6-45.
|