[1] |
HONG D , SUNG J , HONG S , et al. HIGHT: a new block cipher suit-able for low-resource device[C]// Cryptographic Hardware and Em-bedded Systems - CHES 2006. c2006:46-59.
|
[2] |
ZHANG P , SUN B , LI C . Saturation attack on the block cipher HIGHT[C]// The 8th International Conference on Cryptology and Network Security. c2009:76-86.
|
[3] |
KOO B , HONG D , KWON D . Related-key attack on the full HIGHT[C]// Information Security and Cryptology - ICISC 2010. c2010:49-67.
|
[4] |
KOO B , HONG D , KWON D . Biclique attack on the full HIGHT[C]// Information Security and Cryptology - ICISC 2011. c2011:365-374.
|
[5] |
CHEN J , WANG M , PRENEEL B . Impossible differential cryptanaly-sis of the lightweight block ciphers TEA, XTEA and HIGHT[C]// AF-RICACRYPT 2012. c2012:117-137.
|
[6] |
IGARASHI Y , SUEYOSHI R , KANEKO T , et al. Meet-in-the-middle attack with splice-and-cut technique on the 19-round variant of block cipher HIGHT[J]. Infromation Science and Applications, 2015,339:423-429.
|
[7] |
范伟杰, 吴文玲, 张蕾 . HIGHT算法的差分故障攻击[J]. 中国科学院研究生院学报, 2012,29(2):271-276. FAN W J , WU W L , ZHANG L . Differential fault analysis on HIGHT[J]. Journal of Graduate University of Chinese Academy of Science. 2012,29(2):271-276.
|
[8] |
陈浩, 王韬, 张帆 , 等. HIGHT密码代数故障分析[J]. 上海交通大学学报. 2015,49(12):1817-1825. CHEN H , WANG T , ZHANG F , et al. Algebraic fault analysis of HIGHT[J]. Journal of Shanghai Jiaotong University, 2015,49(12):1817-1825.
|
[9] |
KNUDSEN L , WAGNER D . Integral cryptanalysis[C]// FSE 2002. Leuven, Belgium, c2002:112-127.
|
[10] |
MINER M , PHAN R W , POUSSE B . On integral distinguishers of rijndael family of ciphers[J]. Cryptologia, 2012,36(2):104-118.
|
[11] |
YU S , LEI W . Meet-in-the-middle technique for integral attacks against feistel ciphers[C]// Selected Areas in Cryptography 2012. c2012:234-251.
|
[12] |
YI W , CHEN S . Integral cryptanalysis of the block cipher E2[EB/OL]. .
|
[13] |
YI W , CHEN S . Improved results on integral and zero-correlation linear cryptanalysis of the block cipher MIBS[EB/OL]. .
|
[14] |
李超, 孙兵, 李瑞林 . 分组密码的攻击方法与实例分析[M]. 北京: 北京科学出版社, 2010:175-207. LI C , SUN B , LI R L . Block cipher attack method and example analy-sis[M]. Beijing: Beijing Science Press, 2010:175-207.
|