[1] |
HONG D , SUNG J , HONG S ,et al. HIGHT:a new block cipher suitable for low-resource device[C]// International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 2006: 46-59.
|
[2] |
BOGDANOV A , KNUDSEN L R , LEANDER G ,et al. PRESENT:an ultra-lightweight block cipher[C]// International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 2007: 450-466.
|
[3] |
IZADI M , SADEGHIYAN B , SADEGHIAN S S ,et al. MIBS:a new lightweight block cipher[C]// 8th International Conference on Cryptology and Network Security. Springer, 2009: 334-348.
|
[4] |
WU W L , ZHANG L . LBlock:a lightweight block cipher[C]// 9th International Conference on Applied Cryptography and Network Security. Springer, 2011: 327-344.
|
[5] |
BORGHOFF J , CANTEAUT A , GüNEYSU T ,et al PRINCE - a low-latency block cipher for pervasive computing applications[C]// 18th International Conference on the Theory and Application of Cryptology and Information Security. Springer, 2012: 208-225.
|
[6] |
SHIBUTANI K , ISODE T , HIWATARI H ,et al. Piccolo:an ultra-lightweight blockcipher[C]// 13th International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 2011: 342-357.
|
[7] |
SUZAKI T , MINEMATSU K , SORIOKA S ,et al. TWINE:a lightweight block cipher for multiple platforms[C]// 19th International Conference on Selected Areas in Cryptography. Springer, 2012: 339-354.
|
[8] |
ZHENG X X , JIA K T . Impossible differential attack on reduced-round TWINE[C]// 16th International Conference on Information Security and Cryptology. Springer, 2013: 123-143.
|
[9] |
WANG Y F , WU W L . Improved multidimensional zero-correlation linear cryptanalysis and applications to LBlock and TWINE[C]// 19th Australasian Conference on Information Security and Privacy. Springer, 2014: 1-16.
|
[10] |
COBAN M , KARAKOC F , ?ZKAN B .et al Biclique cryptanalysis of TWINE[C]// 11th International Conference on Cryptology and Network Security. Springer, 2012: 43-55.
|
[11] |
MOHAMED T , YOUSSEF A . Generalized MitM attacks on full TWINE[J]. Information Processing Letters, 2016,116(2): 128-135.
|
[12] |
WEI Y C , XU P , RONG Y S . Related-key impossible differential cryptanalysis on lightweight cipher TWINE[J]. Journal of Ambient Intelligence and Humanized Computing, 2019,10(2): 509-517.
|
[13] |
LU J Q . Cryptanalysis of block cipher[R]. London:University of London, 2016.
|
[14] |
谢敏, 牟彦利 . LBlock 算法的相关密钥不可能飞来去器分析[J]. 通信学报, 2017,38(5): 66-71.
|
|
XIE M , MU Y L . Related-key impossible boomerang cryptanalysis on LBlock[J]. Journal on Communications, 2017,38(5): 66-71.
|
[15] |
BIHAM E . New types of cryptanalytic attacks using related key[J]. Journal of Cryptology, 1994,7(4): 229-246.
|
[16] |
BIHAM E , BIRUUKOV A , SHAMIR A . Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials[C]// International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 1999: 12-23.
|
[17] |
WAGNER D , . The boomerang attack[C]// 6th International Workshop on Fast Software Encryption. Springer, 1999: 156-170.
|
[18] |
陈平, 廖福成, 卫宏儒 . 对轻量级密码算法 MIBS 的相关密钥不可能差分攻击[J]. 通信学报, 2014,35(2): 190-193.
|
|
CHEN P , LIAO F C , WEI H R . Related-key impossible differential attack on a lightweight block cipher[J]. Journal on Communications, 2014,35(2): 190-193.
|
[19] |
MA X S , QIAO K X . Related-key rectangle attack on round-reduced Khudra block cipher[C]// The 9th International Conference on Network and System Security. Springer, 2015: 331-344.
|
[20] |
SASAKI Y , . Related-key boomerang attacks on full ANU lightweight block cipher[C]// 16th International Conference on Applied Cryptography and Network Security. Springer, 2018: 421-439.
|