[1] |
IZADI M , SADEGHIYAN B , SADEGHIAN S S ,et al. MIBS:a new lightweight block cipher[C]// 8th International Conference on Cryptology and Network Security-CANS 2009. Kanazawa,Japan, 2009: 334-348.
|
[2] |
WU W L , ZHANG L . LBlock:a lightweight block cipher[C]// 9th International Conference on Applied Cryptography and Network Security-ACNS 2011. Nerja,Spain, 2011: 327-344.
|
[3] |
OJHA S K , KUMAR N , JAIN K ,et al. TWIS:a lightweight block cipher[C]// 5th International Conference on Information Systems Security – ICISS 2009. Kolkata,India, 2009: 280-291.
|
[4] |
WU W L , ZHANG L , YU X L . The DBlock family of block ciphers[J]. Science China Information Sciences, 2015,58(3): 1-14.
|
[5] |
LIU Y , GU D W , LIU Z Q ,et al. Impossible differential attacks on reduced-round LBlock[C]// 8th International Conference on Information Security Practice and Experience – ISPEC 2012. Hangzhou,China, 2012: 97-108.
|
[6] |
SASAKI Y , WANG L . Meet-in-the-middle technique for integral attacks against Feistel ciphers[C]// 19th International Conference on Selected Areas in Cryptography – SAC 2012. Windsor,ON,Canada, 2013: 234-251.
|
[7] |
SASAKI Y , WANG L . Comprehensive study of integral analysis on 22-round LBlock[C]// 15th International Conference on Information Security and Cryptology – ICISC 2012. Seoul,Korea, 2013: 156-169.
|
[8] |
LIU S S , GONG Z , WANG L B . Improved related-key differential attacks on reduced-round LBlock[C]// 14th International Conference on Information and Communications Security – ICICS 2012. Hong Kong,China, 2012: 58-69.
|
[9] |
WEN L , WANG M Q , ZHAO J Y . Related-key impossible differential attack on reduced-round LBlock[J]. Computer Science and Technology, 2014,29(11): 165-176.
|
[10] |
吴寿昌 . 对轻量级分组密码算法 LBlock 的线性分析[D]. 山东大学, 2014.
|
|
WU S C . Linear cryptanalysis of lightweight block cipher LBlock[D]. Shandong University, 2014.
|
[11] |
CHEN J G , MIYAJI A . Differential cryptanalysis and boomerang cryptanalysis of LBlock[C]// Security Engineering and Intelligence Information. Regensburg,Germany, 2013: 1-15.
|
[12] |
LU J Q . Cryptanalysis of block cipher[R]. University of London, 2016.
|
[13] |
BIHAM E . New types of cryptanalytic attacks using related key[J]. Journal of Cryptology, 1994,7(4): 229-246.
|
[14] |
KNUDSEN L R , . Cryptanalysis of LOKI91[C]// Advances in Cryptology–AUSCRYPT’92.Gold Coast. Queensland,Australia, 1992: 196-208.
|
[15] |
BIHAM E , BIRUUKOV A , SHAMIR A . Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials[C]// Advances in Cryptology – EUROCRYPT’99. Prague,Czech Republic, 1999: 12-23.
|
[16] |
WAGNER D , . The boomerang attack[C]// 6th International Workshop on Fast Software Encryption – FSE’99. Rome,Italy, 1999: 156-170.
|
[17] |
陈平, 廖福成, 卫宏儒 . 对轻量级密码算法 MIBS 的相关密钥不可能差分攻击[J]. 通信学报, 2014,35(2): 190-193.
|
|
CHEN P , LIAO F C , WEI H R . Related-key impossible differential attack on a lightweight block cipher[J]. Journal on Communications, 2014,35(2): 190-193.
|
[18] |
MA X S , QIAO K X . Related-key rectangle attack on round-reduced Khudra block cipher[C]// The 9th International Conference on Network and System Security – NSS 2015. New York,NY,USA, 2015: 331-344.
|
[19] |
付立仕, 金晨辉 . MIBS-80的13轮不可能差分分析[J]. 电子与信息学报, 2016,38(4): 848-855.
|
|
FU L S , JIN C H . Impossible differential cryptanalysis on 13-round MIBS-80[J]. Journal of Electronics & Information Technology, 2016,38(4): 848-855.
|
[20] |
李曼曼, 陈少真 . 对ARIA算法中间相遇攻击的改进[J]. 通信学报, 2015,36(3): 277-282.
|
|
LI M M , CHEN S Z . Improved meet-in-the-middle attack on ARIA cipher[J]. Journal on Communications, 2015,36(3): 277-282.
|
[21] |
KIRCANSKI A , . Analysis of boomerang differential trails via a SAT-based constraint solver URSA[C]// 13th International Conference on Applied Cryptography and Network Security – ACNS 2015. New York,NY,USA, 2015: 331-349.
|