[1] |
LISKOV M , RIVEST R , WAGNER D . Tweakable block ciphers[C]// Advances in Cryptology – CRYPTO 2002. Berlin:Springer, 2002: 31-46.
|
[2] |
JEAN J , NIKOLIC I , PEYRIN T . Tweaks and keys for block ciphers:the Tweakey framework[C]// Advances in Cryptology – ASIACRYPT 2014. Berlin:Springer, 2014: 274-288.
|
[3] |
JEAN J , NIKOLI? I , PEYRIN T . KIASU-submission to the CAESAR competition[EB].[2018-11-28](2022-02-09).
|
[4] |
JEAN J , NIKOLI? I ,, PEYRIN T . Joltik-submission to the CAESAR competition[EB].[2018-11-28](2022-02-09).
|
[5] |
JEAN J , NIKOLI? I ,, PEYRIN T . Submission to CAESAR[EB].[2016-10](2022-02-09).
|
[6] |
DOBRAUNIG C , EICHLSEDER M , MENDEL F . Square attack on 7-round Kiasu-BC[C]// International Conference on Applied Cryptography and Network Security. Berlin:Springer, 2016: 500-517.
|
[7] |
ABDELKHALEK A , TOLBA M , YOUSSEF A M . Cryptanalysis of some block cipher constructions[D]. Montreal:The Concordia Institute, 2017.
|
[8] |
TOLBA M , ABDELKHALEK A , YOUSSEF A M . A meet in the middle attack on reduced round Kiasu-BC[J]. IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences, 2016,99(10): 1888-1890.
|
[9] |
DOBRAUNIG C , LIST E . Impossible-differential and boomerang cryptanalysis of round-reduced Kiasu-BC[C]// Topics in Cryptology –CT-RSA 2017. Berlin:Springer, 2017: 207-222.
|
[10] |
JIANG Z L , JIN C H . Multiple impossible differentials cryptanalysis on 7-round ARIA-192[J]. Security and Communication Networks,2018, 2018:7453572.
|
[11] |
LIU Y , SHI Y F , GU D W ,et al. Improved meet-in-the-middle attacks on reduced-round Kiasu-BC and Joltik-BC[J]. The Computer Journal, 2019,62(12): 1761-1776.
|
[12] |
DIFFIE W , HELLMAN M E . Special feature exhaustive cryptanalysis of the NBS data encryption standard[J]. Computer, 1977,10(6): 74-84.
|
[13] |
DEMIRCI H , SEL?UK A A ,, . A meet-in-the-middle attack on 8-round AES[C]// International Workshop on Fast Software Encryption. Berlin:Springer, 2008: 116-126
|
[14] |
GILBERT H , MINIER M . A collisions attack on the 7-rounds Rijndael[C]// AES Candidate Conference. Berlin:Springer, 2000: 1-11.
|
[15] |
DUNKELMAN O , KELLER N , SHAMIR A . Improved single-key attacks on 8-round AES-192 and AES-256[C]// Advances in Cryptology - ASIACRYPT 2010. Berlin:Springer, 2010: 158-176.
|
[16] |
DERBEZ P , FOUQUE P A , JEAN J . Improved key recovery attacks on reduced-round AES in the single-key setting[C]// Advances in Cryptology – EUROCRYPT 2013. Berlin:Springer, 2013: 371-387.
|
[17] |
LI L B , JIA K T , WANG X Y . Improved single-key attacks on 9-round AES-192/256[C]// International Workshop on Fast Software Encryption. Berlin:Springer, 2015: 127-146.
|
[18] |
DONG X Y , LI L B , JIA K T ,et al. Improved attacks on reduced-round camellia-128/192/256[C]// Lecture Notes in Computer Science. Berlin:Springer, 2015: 59-83.
|
[19] |
LIN L , WU W L , ZHENG Y F . Improved meet-in-the-middle distinguisher on Feistel schemes[C]// International Conference on Selected Areas in Cryptography. Berlin:Springer, 2015: 122-142.
|
[20] |
BIRYUKOV A , DERBEZ P , PERRIN L . Differential analysis and meet-in-the-middle attack against round-reduced TWINE[C]// International Workshop on Fast Software Encryption. Berlin:Springer, 2016: 3-27.
|
[21] |
DERBEZ P , PERRIN L . Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE[C]// International Workshop on Fast Software Encryption. Berlin:Springer, 2015: 190-216.
|
[22] |
DERBEZ P , FOUQUE P A . Automatic search of meet-in-the-middle and impossible differential attacks[C]// Advances in Cryptology –CRYPTO 2016. Berlin:Springer, 2016: 157-184.
|
[23] |
BIHAM E , SHAMIR A . Differential cryptanalysis of DES-like cryptosystems[J]. Journal of Cryptology, 1991,4(1): 3-72.
|
[24] |
KANDA M , . Practical security evaluation against differential and linear cryptanalyses for Feistel ciphers with SPN round function[C]// Selected Areas in Cryptography. Berlin:Springer, 2001: 168-179.
|
[25] |
LI R J , JIN C H . Meet-in-the-middle attacks on 10-round AES-256[J]. Designs,Codes and Cryptography, 2016,80(3): 459-471.
|