[1] |
DANIEL J . CAESAR-competition for authenticated encryption:security,applicability,and robustness[OE/OL]. .
|
[2] |
FUHR T , LEURENT G , SUDER V . Forgery and key-recovery attacks on caesar candidate marble[J].Cryptography &Security, Early Symmetric Crypto ESC, 2015.
|
[3] |
WU H.HUANG T , . JAMBU lightweight authenticated encryption mode and AES-JAMBU (v1)[C]// The CAESAR Competition. 2014.
|
[4] |
WU W , ZHANG L . LBlock:a lightweight block cipher[C]// Applied Cryptography and Network Security. 2011: 327-344.
|
[5] |
DERBEZ P , FOUQU A , JEAN J . Improved key recovery attacks on reduced-round AES in the single-key setting[C]// The 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2013: 371-378.
|
[6] |
PEYRIN T , SIM S M , WANG L ,et al. Cryptanalysis of JAMBU[J]. Early Symmetric Crypto ESC, 2015: 77.
|
[7] |
DI B B . Analysis of one-pass block cipher based authenticated encryption schemes[DE/OL]. .
|
[8] |
KAVUN E B , YALCIN T . A lightweight implementation of Keccak Hash function for radio-frequency identification applications[M]// Radio Frequency Identification:Security and Privacy Issues. Berlin: SpringerPress, 2010: 258-269.
|
[9] |
刘彦宾, 韦永壮 . PMAC 模式的消息伪造攻击[J]. 计算机工程, 2009,35(22): 150-152.
|
|
LIU Y B , WEI Y Z . Message forgery attack of PMAC scheme[J]. Computer Engineering, 2009,35(22): 150-152.
|