|
[1]
|
Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B. and Wingers, L. (2015) The SIMON and SPECK Lightweight Block Ciphers. Proceedings of the 52nd Annual Design Automation Conference, San Francisco, 7-11 June 2015, 1-6. [Google Scholar] [CrossRef]
|
|
[2]
|
赵彦杰, 刘伟, 王伟, 等. 轻量级分组密码SIMON和SPECK的安全性分析[J]. 密码学报, 2017, 4(2): 75-85.
|
|
[3]
|
王旭姿. SIMON类型轻量级分组密码算法的安全性分析研究[D]: [博士学位论文]. 北京: 中国科学院大学, 2021.
|
|
[4]
|
Biham, E. and Shamir, A. (1991) Differential Cryptanalysis of Des-Like Cryptosystems. Journal of Cryptology, 4, 3-72. [Google Scholar] [CrossRef]
|
|
[5]
|
Matsui, M. (1994) Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T., Ed., Advances in Cryptology—EUROCRYPT’93, Springer, 386-397. [Google Scholar] [CrossRef]
|
|
[6]
|
胡禹佳, 代政一, 孙兵. SIMON算法的差分-线性密码分析[J]. 信息网络安全, 2022, 22(9): 63-75.
|
|
[7]
|
Gohr, A. (2019) Improving Attacks on Round-Reduced Speck32/64 Using Deep Learning. In: Boldyreva, A. and Micciancio, D., Eds., Advances in Cryptology—CRYPTO 2019, Springer, 150-179. [Google Scholar] [CrossRef]
|
|
[8]
|
Su, H., Zhu, X. and Ming, D. (2021) Polytopic Attack on Round-Reduced Simon32/64 Using Deep Learning. In: Wu, Y. and Yung, M., Eds., Information Security and Cryptology, Springer, 3-20. [Google Scholar] [CrossRef]
|
|
[9]
|
Hou, Z., Ren, J. and Chen, S. (2021) Improve Neural Distinguishers of SIMON and Speck. Security and Communication Networks, 2021, Article ID: 9288229. [Google Scholar] [CrossRef]
|
|
[10]
|
Bao, Z., Guo, J., Liu, M., Ma, L. and Tu, Y. (2022) Enhancing Differential-Neural Cryptanalysis. In: Agrawal, S. and Lin, D., Eds., Advances in Cryptology—ASIACRYPT 2022, Springer, 318-347. [Google Scholar] [CrossRef]
|
|
[11]
|
Chen, Y., Shen, Y., Yu, H. and Yuan, S. (2022) A New Neural Distinguisher Considering Features Derived from Multiple Ciphertext Pairs. The Computer Journal, 66, 1419-1433. [Google Scholar] [CrossRef]
|
|
[12]
|
Zhang, L., Wang, Z. and Wang, B. (2024) Improving Differential-Neural Cryptanalysis. IACR Communications in Cryptology, 1. [Google Scholar] [CrossRef]
|
|
[13]
|
He, K., Zhang, X., Ren, S. and Sun, J. (2016) Deep Residual Learning for Image Recognition. 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, 27-30 June 2016, 770-778. [Google Scholar] [CrossRef]
|
|
[14]
|
Szegedy, C., Liu, W., Jia, Y.Q., Sermanet, P., Reed, S., Anguelov, D., et al. (2015) Going Deeper with Convolutions. 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Boston, 7-12 June 2015, 1-9. [Google Scholar] [CrossRef]
|
|
[15]
|
Hu, J., Shen, L. and Sun, G. (2018) Squeeze-and-Excitation Networks. 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition, Salt Lake City, 18-23 June 2018, 7132-7141. [Google Scholar] [CrossRef]
|
|
[16]
|
Benamira, A., Gerault, D., Peyrin, T. and Tan, Q.Q. (2021) A Deeper Look at Machine Learning-Based Cryptanalysis. In: Canteaut, A. and Standaert, F.X., Eds., Advances in Cryptology—EUROCRYPT 2021, Springer, 805-835. [Google Scholar] [CrossRef]
|