[1] |
IZADI M , SADEGHIYAN B , SADEGHIAN S S . MIBS: a new lightweight block cipher[A]. CANS 2009[C]. Berlin: Springer 2009. 334-348.
|
[2] |
杨林, 王美琴 . 约简轮的 MIBS 算法的差分分析[J]. 山东大学学报(理学版), 2010,45(4): 12-15. YANG L , WANG M Q . Differential cryptanalysis of reduced-round MIBS[J]. Journal of Shandong University(Natural Science), 2010,45(4): 12-15.
|
[3] |
BAY A , NAKAHARA J J , VAUDENAY S . Cryptanalysis of re-duced-round MIBS block cipher[J]. CANS 2010[C]. Berlin: Springer, 2010. 1-19.
|
[4] |
杜承航, 陈佳皙 . 轻量级分组密码算法MIBS不可能差分分析[J]. 山东大学学报(理学版), 2012,47(5): 55-58. DU C H , CHEN J Z . Impossible differential cryptanalysis of re-duced-round MIBS[J]. Journal of Shandong University(Natural Science), 2012,47(7): 55-58.
|
[5] |
王高丽, 王少辉 . 对MIBS算法的Integral攻击[J]. 小型微型计算机系统, 2012,33(4): 773-777. WANG G L , WANG S H . Integral cryptanalysis of reduced-round MIBS block ciphe[J]. Journal of Chinese Computer Systems, 2012,33(4): 773-777.
|
[6] |
刘超, 廖福成, 卫宏儒 . 对MIBS算法的中间相遇攻击[J]. 内蒙古大学学报(自然科学版), 2013,44(3): 308-315. LIU C , LIAO F C , WEI H R . Meet-in-the-middle attacks on MIBS[J]. Journal of Inner Mongolia University(Natural Science Edition), 2013,44(3): 308-315.
|
[7] |
KNUDSEN L R . Cryptanalysis of LOKI91[J]. Advances in Cryptol-ogy-Auscrypt 1992[C]. Gold Coast, Australia, 1992. 196-208.
|
[8] |
BIHAM E . New types of cryptanalytic attacks using related keys[J]. Journal of Cryptology, 1994,7(4): 229-246.
|
[9] |
BIHAM E , BIRYUKOV A , SHAMIR A . Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials[J]. Advances in Cryptology-Eurocrypt 1999[C]. Berlin: Springer-Verlag, 1999. 12-23.
|
[10] |
BIHAM E , DUNKELMAN O , KELLER N . Related-key impossible differential attacks on 8-round AES-192[A]. CT-RSA 2006[C]. Berlin: Springer-Verlag, 2006. 21-33.
|
[11] |
ZHANG W T , WU W L , ZHANG L . Related-key impossible differential attacks on reduced-round AES-256[J]. Journal of Software, 2007,18(11): 2893-2901.
|
[12] |
詹英杰, 关杰, 丁林 . 对简化版LBLock算法的相关密钥不可能差分攻击[J]. 电子与信息学报, 2012,34(9): 2161-2166. ZHAN Y J , GUAN J , DING L . Relatedkey impossible differential attacks on reduced round LBLOCK[J]. Journal of Electronics & Information Technology, 2012,34(9): 2161-2166.
|