|
[1]
|
Shirai, T., Shibutani, K., Akishita, T., Moriai, S. and Iwata, T. (2007) The 128-Bit Blockcipher CLEFIA. International Workshop on Selected Areas in Cryptography, Berlin, Heidelberg, 28 March 2007, 181-195.
https://linkspringer.53yu.com/chapter/10.1007/978-3-540-74619-5_12 [Google Scholar] [CrossRef]
|
|
[2]
|
Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Posch-mann, A., Robshaw, M.J. and Vikkelsoe, C. (2007) PRESENT: An Ultra-Lightweight Block Cipher. International Workshop on Cryptographic Hardware and Embedded Systems, Berlin, Heidelberg, 10 September 2007, 450-466.
https://linkspringer.53yu.com/chapter/10.1007/978-3-540-74735-2_31 [Google Scholar] [CrossRef]
|
|
[3]
|
Banik, S., Pandey, S.K., Peyrin, T., Sasaki, Y., Sim, S.M. and Todo, Y. (2017) GIFT: A Small Present. International Conference on Cryptographic Hardware and Embedded Systems, Cham, 25 August 2017, 321-345.
https://linkspringer.53yu.com/chapter/10.1007/978-3-319-66787-4_16 [Google Scholar] [CrossRef]
|
|
[4]
|
Banik, S., Bogdanov, A., Isobe, T., Shibutani, K., Hiwatari, H., Akishita, T. and Regazzoni, F. (2015) Midori: A Block Cipher for Low Energy. International Conference on the Theory and Application of Cryptology and Information Security, Berlin, Heidelberg, 30 December 2015, 411-436.
https://linkspringer.53yu.com/chapter/10.1007/978-3-662-48800-3_17 [Google Scholar] [CrossRef]
|
|
[5]
|
Biham, E. and Shamir, A. (1992). Differential Cryptanalysis of the Full 16-Round DES. Annual International Cryptology Conference, Berlin, Heidelberg, 16 August 1992, 487-496.
https://linkspringer.53yu.com/chapter/10.1007/3-540-48071-4_34[CrossRef]
|
|
[6]
|
Matsui, M. (1993) Linear Cryptanalysis Method for DES Cipher. Workshop on the Theory and Application of Cryptographic Techniques, Berlin, Heidelberg, 27 May 1993, 386-397.
https://linkspringer.53yu.com/chapter/10.1007/3-540-48285-7_33 [Google Scholar] [CrossRef]
|
|
[7]
|
Fu, K., Wang, M., Guo, Y., Sun, S. and Hu, L. (2016) MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck. International Conference on Fast Software Encryption, Berlin, Heidelberg, 20 July 2016, 268-288. https://linkspringer.53yu.com/chapter/10.1007/978-3-662-52993-5_14 [Google Scholar] [CrossRef]
|
|
[8]
|
Leander, G. and Poschmann, A. (2007) On the Classification of 4 Bit S-Boxes. International Workshop on the Arithmetic of Finite Fields, Berlin, Heidelberg, 21 September 2007, 159-176.
https://linkspringer.53yu.com/chapter/10.1007/978-3-540-73074-3_13 [Google Scholar] [CrossRef]
|
|
[9]
|
李超. 分组密码的攻击方法与实例分析[M]//孙兵, 李瑞林. 北京: 科学出版社, 2010: 77-107.
|