[1] |
BORGHO J , CANTEAUT A , GüNEYSU T ,, et al . PRINCE:a low-latency block cipher for pervasive computing applications[C]// ASIACRYPT 2012. 2012: 208-225.
|
[2] |
KILIAN J , ROGAWAY P . How to protect DES against exhaustive key search (an analysis of DESX)[J]. Journal of Cryptology, 2021,14(1): 17-35.
|
[3] |
JEAN J , NIKOLIC I , PEYRIN T ,et al. Security analysis of PRINCE[C]// International Workshop on Fast Software Encryption (FSE) 2013. 2013: 92-111.
|
[4] |
SOLEIMANY H , BLONDEAU C , YU X L ,et al. Refection cryptanalysis of PRINCE-like ciphers[C]// International Workshop on Fast Software Encryption (FSE) 2013. 2013: 71-91.
|
[5] |
CANTEAUT A , NAYA-PLASENCIA M ,, VAYSSIERE B . Sieve-inthe-middle improved MITM attacks[C]// Advances in Cryptology CRYPTO. 2013: 222-240.
|
[6] |
CANTEAUT A , FUHR T , GILBERT H ,et al. Multiple differential cryptanalysis of round-reduced PRINCE[C]// International Workshop on Fast Software Encryption (FSE). 2014: 591-610.
|
[7] |
DERBEZ P , PERRIN L . Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE[C]// International Workshop on Fast Software Encryption(FSE). 2014: 190-216.
|
[8] |
THE PRINCE TEAM.. PRINCE challenge[R].
|
[9] |
段春晖, 谭林, 戚文峰 . 减轮 PRINCE 的混合差分分析[J]. 信息工程大学学报, 2019,20(6): 695-701.
|
|
DUAN C H , TAN L , QI W F . Mixture differential cryptanalysis on round-reduced PRINCE[J]. Journal of Information Engineering University, 2019,20(6): 695-701.
|
[10] |
ABED F , LIST E , LUCKS S . On the security of the core of prince against Biclique and differential cryptanalysis[R]. 2012.
|
[11] |
ZHAO G Y , SUN B , LI C ,et al. Truncated differential cryptanalysis of PRINCE[J]. Security and Communication Networks, 2015(8): 2875-2887.
|
[12] |
LI L B , JIA K T , WANG X Y . Improved meet-in-the-middle attacks on AES-192 and PRINCE[R].
|
[13] |
魏悦川, 潘晓中, 戎宜生 ,等. 对 PRINCE分组密码的不可能差分攻击[J]. 西安电子科技大学学报, 2017,44(1): 119-124.
|
|
WEI Y C , PAN X Z , RONG Y S ,et al. Impossible differential cryptanalysis on the PRINCE[J]. Journal of Xidian University, 2017,44(1): 119-124.
|
[14] |
袁征, 彭真 . 轻量级分组密码 PRINCE 算法的 Biclique 分析[J]. 密码学报, 2017,4(6): 517-527.
|
|
YUAN Z , PENG Z . Biclique cryptanalysis of lightweight block cipher PRINCE[J]. Journal of Cryptologic Research, 2017,4(6): 517-527.
|
[15] |
BIHAM E , SHAMIR A . Differential cryptanalysis of DES-like cryptosystems[J]. Journal of Cryptology, 1991,4(1): 3-72.
|
[16] |
MATSUI M , . Linear cryptanalystis method for DES cipher[C]// Advances in Cryptology-Proceedings of EUROCRYPT '93. 1993: 386-397.
|
[17] |
LANGFORD S K , HELLMAN M E . Differential-linear Cryptanalysis[C]// Advances in Cryptology-proceedings of CRYPTO '94. 1994: 17-25.
|
[18] |
BIHAM E , DUNKELMAN O , KELLER N . Enhancing differential-linear cryptanalysis[C]// Advances in Cryptology-proceedings of ASIACRYPT 2002. 2002: 254-266.
|
[19] |
LIU Z Q , GU D W , ZHANG J ,et al. Differential-multiple linear cryptanalysis[C]// Proceedings of Information Security and Cryptology (Inscrypt 2009). 2009: 35-49.
|
[20] |
LU J Q . A methodology for differential-linear cryptanalysis and its applications[J]. Des Codes Cryptography, 2015,77(1): 11-48.
|
[21] |
BLONDEAU C , LEANDER G , NYBERG K . Differential-linear cryptanalysis revisited[J]. Journal of Cryptology, 2017,30(3): 859-888.
|
[22] |
CHABAUD F , VAUDENAY S . Links between differential and linear cryptanalysis[C]// Advances in Cryptology-Proceedings of EUROCRYPT '94, 1994: 356-365.
|
[23] |
BLONDEAU C , NYBERG K . New links between differential and linear cryptanalysis[C]// Advances in Cryptology-Proceedings of EUROCRYPT 2013. 2013: 388-404.
|
[24] |
BAR-ON A , DUNKELMAN O , KELLER N ,et al. DLCT:a new tool for differential-linear cryptanalysis[C]// EUROCRYPT 2019. 2019: 313-342.
|