Table 1.
Cryptosystems | Attacked by | Attack Approaches |
---|---|---|
Zhang et al. (2013) [4] | Hoang et al. (2018) [21] | chosen ciphertext |
Zhou et al. (2015) [6] | Chen et al. (2017) [22] | Differential |
Zhang et al. (2016) [7] | Wu et al. (2018) [23] | chosen plaintext |
Huang et al. (2012) [9] | Wang et al. (2014) [24] | chosen plaintext |
Chen et al. (2015) [10] | Hu et al. (2017) [25] | chosen plaintext and ciphertext |
Liu et al. (2016) [14] | Zhang et al. (2017) [26] | chosen plaintext |
Pak et al. (2017) [18] | Wang et al. (2018) [27] | chosen plaintext |