|
[1]
|
罗守山. 密码学与信息安全技术[M]. 北京: 北京邮电大学出版社, 2009: 45-50.
|
|
[2]
|
Lee, T.R., et al. (2021) Lightweight Block Cipher Security Evaluation Based on Machine Learning Classifiers and Active S-Boxes. IEEE Access, 9, 134052-134064. [Google Scholar] [CrossRef]
|
|
[3]
|
Bagane, P.A. and Sirbi, K. (2020) Bibliometric Survey for Cryptanalysis of Block Ciphers towards Cyber Security. Library Philosophy and Practice, 1-18.
|
|
[4]
|
Guo, H., Sun, S., Shi, D., Sun, L., Sun, Y., Hu, L. and Wang, M. (2020) Differential Attacks on CRAFT Exploiting the Involutory s-Boxes and Tweak Additions. IACR Transactions on Symmetric Cryptology, 2020, 119-151. [Google Scholar] [CrossRef]
|
|
[5]
|
Biham, E. and Shamir, A. (1991) Differential Cryptanalysis of DES-Like Cryptosystems. Journal of Cryptology, 4, 3-72. [Google Scholar] [CrossRef]
|
|
[6]
|
Lai, X., Massey, J.L. and Murphy, S. (1991) Markov Ciphers and Differential Cryptanalysis. In: Workshop on the Theory and Application of Cryptographic Techniques, Springer, Berlin, 17-38. [Google Scholar] [CrossRef]
|
|
[7]
|
Daemen, J. and Rijmen, V. (2002) The Design of Rijndeal. AES—The Advanced Encryption. Springer-Verlag, Berlin.
|
|
[8]
|
Hadipour, H., Bagheri, N. and Song, L. (2021) Improved Rectangle Attacks on SKINNY and CRAFT. IACR Transactions on Symmetric Cryptology, 2021, 140-198. [Google Scholar] [CrossRef]
|
|
[9]
|
Sehrawat, D. and Gill, N.S. (2018) Lightweight Block Ciphers for IoT Based Applications: A Review. International Journal of Applied Engineering Research, 13, 2258-2270.
|
|
[10]
|
Dey, S. and Ghosh, R. (2018) A Review of Existing 4-bit Crypto S-Box Cryptanalysis Techniques and Two New Techniques with 4-bit Boolean Functions for Cryptanalysis of 4-bit Crypto S-Boxes. Advances in Pure Mathematics, 8, 272. [Google Scholar] [CrossRef]
|
|
[11]
|
Tentu, A.N. (2020) A Review on Evolution of Symmetric Key Block Ciphers and Their Applications. IETE Journal of Education, 61, 34-46. [Google Scholar] [CrossRef]
|
|
[12]
|
Dehnavi, S.M. (2018) Further Observations on SIMON and SPECK Block Cipher Families. Cryptography, 3, 1. [Google Scholar] [CrossRef]
|
|
[13]
|
Bar-On, A., Dunkelman, O., Keller, N. and Weizman, A. (2019) DLCT: A New Tool for Differential-Linear Cryptanalysis. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), Springer, Berlin, 313-342. [Google Scholar] [CrossRef]
|
|
[14]
|
Fan, T., Li, L., Wei, Y. and Pasalic, E. (2022) Differential Cryptanalysis of Full-Round ANU-II Ultra-Lightweight Block Cipher. International Journal of Distributed Sensor Networks, 18, 15501329221119398-15501329221119398. [Google Scholar] [CrossRef]
|
|
[15]
|
Teh, J.S. and Biryukov, A. (2022) Differential Cryptanalysis of WARP. Journal of Information Security and Applications, 70, Article ID: 103316. [Google Scholar] [CrossRef]
|
|
[16]
|
Zhang, K., Lai, X., Guan, J. and Hu, B. (2022) Research on the Security Level of µ2 against Impossible Differential Cryptanalysis. KSII Transactions on Internet and Information Systems (TIIS), 16, 972-985. [Google Scholar] [CrossRef]
|
|
[17]
|
Zhang, P. and Zhang, W. (2018) Differential Cryptanalysis on Block Cipher Skinny with MILP Program. Security and Communication Networks, 2018, Article ID: 3780407. [Google Scholar] [CrossRef]
|
|
[18]
|
Cao, M. and Zhang, W. (2019) Related-Key Differential Cryptanalysis of the Reduced-Round Block Cipher GIFT. IEEE Access, 7, 175769-175778. [Google Scholar] [CrossRef]
|
|
[19]
|
Ji, F., Zhang, W., Zhou, C. and Ding, T. (2020) Improved (Related-Key) Differential Cryptanalysis on GIFT. In: International Conference on Selected Areas in Cryptography (ICSAC), Springer, Berlin, 198-228. [Google Scholar] [CrossRef]
|
|
[20]
|
Kousalya, R. (2021) Security Analysis against Differential Cryptanalysis Using Active S-Boxes. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12, 701-709.
|
|
[21]
|
Hu, K., Peyrin, T. and Wang, M. (2022) Finding All Impossible Differentials When Considering the DDT. Cryptology ePrint Archive.
|
|
[22]
|
Dwivedi, A.D. and Srivastava, G. (2018) Differential Cryptanalysis of Round-Reduced LEA. IEEE Access, 6, 79105-79113. [Google Scholar] [CrossRef]
|
|
[23]
|
Liu, Z., Li, Y., Jiao, L. and Wang, M. (2020) A New Method for Searching Optimal Differential and Linear Trails in ARX Ciphers. IEEE Transactions on Information Theory, 67, 1054-1068. [Google Scholar] [CrossRef]
|
|
[24]
|
Benamira, A., Gerault, D., Peyrin, T. and Tan, Q.Q. (2021) A Deeper Look at Machine Learning-Based Cryptanalysis. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), Springer, Berlin, 805-835. [Google Scholar] [CrossRef]
|
|
[25]
|
Pal, D., Mandal, U., Chaudhury, M., Das, A. and Chowdhury, D.R. (2022) A Deep Neural Differential Distinguisher for ARX Based Block Cipher. Cryptology ePrint Archive.
|