[1] |
SHIMIZU A , MIYAGUCHI S . Fast data encipherment algorithm FEAL[C]// International Conference on Theory and Application of Cryptographic Techniques. c1987: 267-278.
|
[2] |
WHEELER D J , NEEDHAM R M . Tea,a tiny encryption algorithm[M]// Fast Software Encryption. Berlin:Springer, 2015: 363-366.
|
[3] |
RIVEST R L , . The RC5 encryption algorithm[C]// Fast Software Encryption:Second International Workshop. c1994: 14-16.
|
[4] |
HONG D , SUNG J , HONG S ,et al. HIGHT:a new block cipher suitable for low-resource device[M]// Cryptographic Hardware and Embedded Systems-CHES 2006. Berlin:Springer, 2006: 46-59.
|
[5] |
BEAULIEU R , SHORS D , SMITH J ,et al. The SIMON and SPECK families of lightweight block ciphers[R]. IACR Cryptology ePrint Archive, 2013.
|
[6] |
BERNSTEIN D J . The salsa20 family of stream ciphers[R]. New Stream Cipher Designs-The eSTREAM Finalists , 2008.
|
[7] |
RIVEST R L , . The MD4 message digest algorithm[C]// CRYPTO. c1990: 303-311.
|
[8] |
FERGUSON N , LUCKS S , SCHNEIER B ,et al. The skein hashfunction family[R]. Submission to NIST(Round 3), 2010.
|
[9] |
AUMASSON J P , HENZEN L , MEIER W ,et al. Sha-3 proposal blake[R]. Submission to NIST(Round 3), 2010.
|
[10] |
BIHAM E , SHAMIR A . Differential cryptanalysis of des-like cryptosystems[J]. Journal of Cryptology, 1991,1(4): 3-72.
|
[11] |
AOKI K , KOBAYASHI K , MORIAI S . Best differential characteristic search of FEAL[M]// Fast Software Encryption. Berlin :Springer, 1997: 41-53.
|
[12] |
BANNIER A , BODIN N , FILIOL E . Automatic search for a maximum probability differential characteristic in a substitution-permutation network[C]// International Conference on System Sciences,IEEE Computer Society. c2015: 5165-5174.
|
[13] |
BIRYUKOV A , NIKOLIC I . Automatic search for related-key differential characteristics in byte-oriented block ciphers :application to AES,camellia,khazad and others[C]// International Conference on the Theory and Applications of Cryptographic Techniques. c2010: 322-344.
|
[14] |
BIRYUKOV A , NIKOLIC I . Search for related-key differential characteristics in des-like ciphers[C]// International Conference on FAST Software Encryption. c2011: 18-34.
|
[15] |
BOUILLAGUET C , DERBEZ P , FOUQUE P . Automatic search of attacks on round-reduced AES and applications[R]. IACR Cryptology ePrint Archive, 2012.
|
[16] |
MATSUI M , . On correlation between the order of s-boxes and the strength of DES[M]// Advances in Cryptology—EUROCRYPT'94. Berlin:Springer, 1994: 366-375.
|
[17] |
MOUHA N , WANG Q , GU D ,et al. Differential and linear cryptanalysis using mixed-integer linear programming[C]// 7th International Conference on Information Security and Cryptology. c2011.
|
[18] |
SUN S W , HU L , WANG P ,et al. Automatic security evaluation and (related-key) differential characteristic search:application to simon,present,lblock,DES(L) and other bit-oriented block ciphers[C]// The 20th International Conference on the Theory and Application of Cryptology and Information Security. c2014.
|
[19] |
BIRYUKOV A , VELICHKOV V . Automatic search for differential trails in ARX ciphers[M]// Topics in Cryptology–CT-RSA 2014. Berlin:Springer , 2014: 227-250.
|
[20] |
BIRYUKOV A , ROY A , VELICHKOV V . Differential analysis of block ciphers SIMON and SPECK[M]// Fast Software Encryption. Berlin:Springer Heidelberg, 2014: 546-570.
|
[21] |
FU K , WANG M Q , GUO Y ,et al. MILP-based automatic search algorithms for differential and linear trails for speck[C]// Fast Software Encryption,23rd International Workshop. c2016.
|