上一条: The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers
下一条: Improved MEET-in-the-middle preimage attacks against AES hashing modes