[1] |
CANNIàRE C , PRENEEL B . Trivium specifications[EB/OL]. , 2007.
|
[2] |
MAXIMOV A , BIRYUKOV A . Two trivial attacks on Trivium[C]// 2007: 36-55.
|
[3] |
DINURA , SHAMIR A , . Cubic attacks on tweakable black box polynomials[C]// Advances in Cryptology-EUROCRYPT 2009. 2009: 278-299.
|
[4] |
STANKOVSKI P , . Greedy distinguishers and nonrandomness detectors[C]// INDOCRYPT 2010. 2010: 210-226.
|
[5] |
HOJSíK M , RUDOLF B . Differential fault analysis of Trivium[C]// FSE 2008. 2008: 158-172.
|
[6] |
HU Y P , GAO J T , LIU Q ,et al. Fault analysis of Trivium[C]// Designs,Codes and Cryptography. 2011: 289-311.
|
[7] |
AVIJIT D , GOUTAM P . Deterministic hard fault attack on trivium[C]// Advances in Information and Computer Security. 2014: 134-145.
|
[8] |
PRAKASH D , AVISHEK A . Improved multi-bit differential fault analysis of trivium[C]// Progress in Cryptology. 2014: 37-52.
|
[9] |
TURAN M S , KARA O . Linear approximations for 2-round Trivium[C]// Workshop on the State of the Art of Stream Cipher (SASC2007). Bochum, 2007: 22-31.
|
[10] |
贾艳艳, 胡予濮, 杨文峰 ,等. 2轮Trivium的多线性密码分析[J]. 电子与信息学报, 2011,33(1): 223-227. JIA Y Y , HU Y P , YANG W F ,et al. Linear cryptanalysis of 2-round Trivium with multiple approximations[J]. Journal of Electronics &Information Technology, 2011,33(1): 223-227.
|
[11] |
孙文龙, 关杰, 刘建东 . 针对简化版Trivium算法的线性分析[J]. 计算机学报, 2012,35(9): 1890-1896. SUN W L , GUAN J , LIU J D . Linear cryptanalysis of simplified Trivium[J]. Chinese Journal of Computers, 2012,35(9): 1890-1896.
|
[12] |
欧智慧, 赵亚群 . 2 轮 Trivium 的线性逼近研究[J]. 计算机工程, 2013,39(11): 31-34. OU Z H , ZHAO Y Q . Study on linear approximation of 2-round Trivium[J]. Computer Engineering, 2013,39(11): 31-34.
|
[13] |
李世取, 曾本胜, 廉玉忠 ,等. 密码学中的逻辑函数[M]. 北京: 中软电子出版社, 2003: 254-255. LI S Q , ZENG B S , LIAN Y Z ,et al. Logical functions in cryptography[M]. Beijing: Software and Electronic PressPress, 2003: 254-255.
|
[14] |
DOUGLAS R , STINSON STINSON . 密码学原理与实践[M]. 北京: 电子工业出版社, 2010: 123-124. DOUGLAS R , STINSON . Cryptography theory and practice[M]. Beijing: Publishing House of Electronics IndustryPress, 2010: 123-124.
|
[15] |
丁存生, 肖国镇 . 流密码及其应用[M]. 北京: 国防科学出版社, 1994: 28-29. DING C S , XIAO G Z . Stream cipher and its applications[M]. Beijing: National Defense Industry PressPress, 1994: 28-29.
|