[1] |
MARIOT L , PICEK S , LEPORATI A ,et al. Cellular automata based S-boxes[J]. Cryptography and Communications, 2019,11(1): 41-62.
|
[2] |
NIST. Announcing request for candidate algorithm nominations for a new cryptographic hash algorithm(SHA-3)family[EB]. Gaithersburg:National Institute of Standards and Technology, 2007.
|
[3] |
BERTONI G , DAEMEN J , PEETERS M ,et al. The KECCAK reference,SHA-3 competition (round 3)[EB]. STMicroelectronics,NXP Semiconductors, 2011.
|
[4] |
DAEMEN J , CLAPP C S K . Fast hashing and stream encryption with PANAMA[C]// International Workshop on FAST Software Encryption. Springer-Verlag, 1998: 60-74.
|
[5] |
CLAESEN L , DAEMEN J , GENOE M ,et al. Subterranean:a 600 Mbit/s cryptographic VLSI chip[C]// IEEE International Conference on Computer Design:VLSI in Computers and Processors. IEEE, 1993: 610-613.
|
[6] |
DAEMEN J , GOVAERTS R , VANDEWALLE J . A new approach to block cipher design[C]// Fast Software Encryption. Cambridge Security Workshop, 1993: 18-32.
|
[7] |
DOBRAUNING C , EICHLSEDER M , MENDEL F ,et al. Ascon v1.2:submission to the CAESAR competition[EB]. Institute for Applied Information Processing and Communications,Infineon Technologies Austria AG, 2016.
|
[8] |
SHANNON C E . Communication theory of secrecy systems[J]. Bell System Technical Journal, 1949,28(4): 656-715.
|
[9] |
NAJI A W , HAMEED S A , ZAIDAN B B ,et al. Novel framework for hidden data in the image page within executable file using computation between advanced encryption standard and distortion techniques[J]. International Journal of Computer Science and Information Security, 2009,3(1): 73-78.
|
[10] |
PIEPRZYK J , FINKELSTEIN G . Towards effective nonlinear cryptosystem design[J]. IEE Proceedings E-Computers and Digital Techniques, 2005,135(6): 325-335.
|
[11] |
金晨辉, 郑浩然, 张少武 ,等. 密码学[M]. 北京: 高等教育出版社, 2009.
|
|
JIN C H , ZHENG H R , ZHANG S W ,et al. Cryptography[M]. Beijing: Higher Education PressPress, 2009.
|
[12] |
江志松 . 元胞自动机的语法复杂性[D]. 苏州:苏州大学, 2001.
|
|
JIANG Z S . The grammatical complexity of cellular automata[D]. Suzhou:Suzhou University, 2001.
|
[13] |
李倩男, 李云强, 蒋淑静 ,等. Keccak类非线性变换的差分性质研究[J]. 通信学报, 2012,33(9): 140-146.
|
|
LI Q N , LI Y Q , JIANG S J ,et al. Research on differential properties of Keccak-like nonlinear transform[J]. Journal on Communications, 2012,33(9): 140-146.
|
[14] |
DINUR I , MORAWIECKI P , PIEPRZYK J ,et al. Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function[J]. Theory and Application of Cryptographic Techniques, 2015: 733-761.
|