Skip to main content
. 2018 Jul 18;20(7):535. doi: 10.3390/e20070535

Table 1.

Some cryptosystems attacked by some typical approaches.

Cryptosystems Attacked by Attack Approaches
Zhang et al. (2013) [4] Hoang et al. (2018) [21] chosen ciphertext
Zhou et al. (2015) [6] Chen et al. (2017) [22] Differential
Zhang et al. (2016) [7] Wu et al. (2018) [23] chosen plaintext
Huang et al. (2012) [9] Wang et al. (2014) [24] chosen plaintext
Chen et al. (2015) [10] Hu et al. (2017) [25] chosen plaintext and ciphertext
Liu et al. (2016) [14] Zhang et al. (2017) [26] chosen plaintext
Pak et al. (2017) [18] Wang et al. (2018) [27] chosen plaintext