The following publications are possibly variants of this publication:
- Improved Key Recovery Attack on the BEAN Stream CipherHui Wang, Martin Hell, Thomas Johansson, Martin Ă…gren. ieicet, 96-A(6):1437-1444, 2013. [doi]
- Improved key-recovery attacks on reduced-round WEM-8Jun Liu, Dachao Wang, Yupu Hu, Jie Chen, Baocang Wang. dcc, 90(10):2419-2448, 2022. [doi]