[1] |
ALBRECHT M R , RECHBERGER C , SCHNEIDER T ,et al. Ciphers for MPC and FHE[C]// EUROCRYPT. 2015: 430-454.
|
[2] |
DINUR I , LIU Y W , MEIER W ,et al. Optimized interpolation attacks on LowMC[C]// ASIACRYPT. 2015: 535-560.
|
[3] |
DOBRAUNIG C , EICHLSEDER M , MENDEL F . Higher-order cryptanalysis of LowMC[C]// ICISC. 2015: 87-101.
|
[4] |
CHASE M , DERLER D , GOLDFEDER S ,et al. Post-quantum zero-knowledge and signatures from symmetric-key primitives[C]// ACM Conference on Computer and Communications Security. 2017.
|
[5] |
RECHBERGER C , SOLEIMANY H , TIESSEN T . Cryptanalysis of low-data instances of full LowMCv2[C]// IACR Trans Symmetric Cryptol. 2018: 163-181.
|
[6] |
DEMIRCI H , SEL?UK A A . A meet-in-the-middle attack on 8-round AES[C]// FSE. 2008: 116-126.
|
[7] |
DUNKELMAN O , KELLER N , SHAMIR A . Improved single-key attacks on 8-round AES-192 and AES-256[C]// ASIACRYPT. 2010: 158-176.
|
[8] |
陈少真, 鲁林真 . 对8轮ARIA算法的差分枚举攻击[J]. 电子与信息学报, 2011,33(7): 1770-1774.
|
|
CHEN S Z , LU L Z . Differential enumeration attack on ARIA[J]. Journal of Electronics and Information Technology, 2011,33(7): 1770-1774.
|
[9] |
崔竞一 . 基于中间相遇思想的攻击方法研究[D]. 郑州:信息工程大学, 2017.
|
|
CUI J Y . Research on cryptanalysis based on meet-in-the-middle[D]. Zhengzhou:Information Engineering University, 2017.
|
[10] |
王萼芳, 石明生 . 高等代数(第三版)[M]. 北京: 高等教育出版社, 2003.
|
|
WANG E F , SHI M S . Advanced algebra (third edition)[M]. Beijing: Higher Education Press, 2003.
|
[11] |
HELL M , OHANSSON T , MAXIMOV A ,et al. The grain family of stream ciphers[J]. The eSTREAM Finalists, 2008: 179-190.
|
[12] |
MEIER W , STAFFELBACH O . The self-shrinking generaTor[C]// EUROCRYPT. 1994: 205-214.
|
[13] |
DINUR I , KALES D , PROMITZER A ,et al. Linear equivalence of block ciphers with partial non-linear layers:application to LowMC[C]// EUROCRYPT. 2019: 343-372.
|
[14] |
TIESSEN T , . Polytopic cryptanalysis[C]// EUROCRYPT. 2016: 214-239.
|
[15] |
NYBERG K , . Differentially uniform mappings for cryptography[C]// EUROCRYPT. 1993: 55-64
|
[16] |
李鹏飞 . 基于密码结构的扩散层构造[J]. 网络与信息安全学报, 2017,3(6): 65-76.
|
|
LI P F . Construction of diffusion layers based on cipher structures[J]. Chinese Journal of Network and Information Security, 2017,3(6): 65-76.
|