|
[1]
|
杜小妮, 王香玉, 梁丽芳, 等. 轻量级分组密码Piccolo的量子密码分析[J]. 通信学报, 2023, 44(6): 175-182.
|
|
[2]
|
黄湘蜀, 王敏, 杜之波, 等. 针对轻量级分组密码算法PRESENT的随机差分故障攻击[J]. 成都信息工程大学学报, 2022, 37(1): 8-15. [Google Scholar] [CrossRef]
|
|
[3]
|
Borghoff, J., Canteaut, A., Güneysu, T., et al. (2012) Prince—A Low-Latency Block Cipher for Pervasive Computing Applications. Advances in Cryptology—ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, 2-6 December 2012, 208-225. [Google Scholar] [CrossRef]
|
|
[4]
|
孟娇, 李濛, 胡晓波, 等. 轻量级LBlock算法硬件实现与研究[J]. 电力信息与通信技术, 2023, 21(3): 47-52. [Google Scholar] [CrossRef]
|
|
[5]
|
Beierle, C., Leander, G., Moradi, A., et al. (2019) Craft: Lightweight Tweakable Block Cipher Withefficient Protection against DFA Attacks. IACRTransactions on Symmetric Cryptology, 2019, 5-45. [Google Scholar] [CrossRef]
|
|
[6]
|
Bansod, G., Pisharoty, N. and Patil, A. (2017) BORON: An Ultra-Lightweight and Low Power Encryption Design for Pervasive Computing. Frontiers of Information Technology & Electronic Engineering, 18, 317-331. [Google Scholar] [CrossRef]
|
|
[7]
|
Liang, H. and Wang, M. (2019) Cryptanalysis of the Lightweight Block Cipher BORON. Security and Communication Networks, 2019, 1-12. [Google Scholar] [CrossRef]
|
|
[8]
|
Li, Y., Liang, M., Lin, H., et al. (2020) Integral Attack on Reduced-Round BORON Based on Bit-Based Division Property. Journal of Physics: Conference Series, 1486, Article ID: 022016. [Google Scholar] [CrossRef]
|
|
[9]
|
Wu, X.N., Li, Y.X., Li, L.C., et al. (2022) Impossible Differential Cryptanalysis of BORON. Journal of Information Science & Engineering, 38, 805-819.
|
|
[10]
|
Diffie, W. and Hellman, M.E. (1977) Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard. Computer, 10, 74-84. [Google Scholar] [CrossRef]
|
|
[11]
|
Li, R. and Jin, C. (2016) Meet-in-the-Middle Attacks on 10-Round AES-256. Designs, Codes and Cryptography, 80, 459-471. [Google Scholar] [CrossRef]
|
|
[12]
|
Sun, S., Hu, L., Wang, P., et al. (2014) Automatic Security Evaluation and (Related-Key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES (L) and Other Bit-Oriented Block Ciphers. Advances in Cryptology—ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, 7-11 December 2014, 158-178. [Google Scholar] [CrossRef]
|
|
[13]
|
Sasaki, Y. and Todo, Y. (2017) New Algorithm for Modeling S-Box in MILP Based Differential and Division Trail Search. Innovative Security Solutions for Information Technology and Communications: 10th International Conference, SecITC 2017, Bucharest, 8-9 June 2017, 150-165. [Google Scholar] [CrossRef]
|