[1] |
BELLARE M , KOHNO T , NAMPREMPRE C . Authenticated encryption in SSH:Provably ?xing the SSH binary packet protocol[C]// Proceedings of the 9th ACM Conference on Computer and Communications Security. 2002: 1-11.
|
[2] |
KRAWCZYK H , . The order of encryption and authentication for protecting communications (or:How secure is SSL)[C]// Advances in Cryptology-CRYPTO 2001. 2001: 310-331.
|
[3] |
BELLARE M , NAMPREMPRE C . Authenticated encryption:Relations among notions and analysis of the generic composition paradigm[C]// Advances in Cryptology-ASIACRYPT 2000.Berlin:Springer. 2000: 531-545.
|
[4] |
BELLARE M , ROGAWAY P . Encode-then-encipher encryption:how to exploit nonces or redundancy in plaintexts for efficient cryptography[C]// Advances in Cryptology—ASIACRYPT 2000. 2000: 317-330.
|
[5] |
ROGAWAY P , BELLARE M , BLACK J . OCB:a block-cipher mode of operation for efficient authenticated encryption[J]. ACM Transactions on Information and System Security (TISSEC), 2003,6(3): 365-403.
|
[6] |
DWORKIN M J , . National institute of standards and technology (NIST).Recommendation for block cipher modes of operation:the CCM mode for authentication and con?dentiality[R]. 2004.
|
[7] |
BELLARE M , ROGAWAY P , WAGNER D . The EAX mode of operation[C]// Fast Software Encryption. 2004.
|
[8] |
MCGREW D A , VIEGA J . The Galois/counter mode of operation (GCM)[J]. Submission to NIST Modes of Operation Process, 2004,(20).
|
[9] |
GOLDWASSER S , MICALI S . Probabilistic encryption[J]. Journal of Computer and System Sciences, 1984,28(2): 270-299.
|
[10] |
SASAKI Y , LEI W . Message extension attack against authenticated encryptions:application to PANDA[J]. IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences, 2016,99(1): 49-57.
|
[11] |
MOUHA N , WANG Q , GU D ,et al. Differential and linear cryptanalysis using mixed-integer linear programming[C]// International Conference on Information Security and Cryptology. 2011: 57-67.
|
[12] |
田玉丹, 韦永壮 . 认证加密算法SCREAM及iSCREAM的新伪造攻击[J]. 网络与信息安全学报, 2016,2(1): 60-64.
|
|
TIAN Y D , WEI Y Z . New forgery attack on the authenticated cipher SCREAM and iSCREAM[J]. Chinese Journal of Network and Information Security, 2016,2(1): 60-64.
|
[13] |
田玉丹, 韦永壮 . 认证加密模型JAMBU的新分析[J]. 网络与信息安全学报, 2017,3(7): 53-57.
|
|
TIAN Y D , WEI Y Z . New cryptanalysis of the authenticated cipher model JAMBU[J]. Chinese Journal of Network and Information Security, 2017,3(7): 53-57.
|
[14] |
WU H , PRENEEL B . AEGIS:a fast authenticated encryption algorithm[C]// Selected Areas in Cryptography-SAC. 2014: 185-201.
|
[15] |
BOGDANOV A , MENDEL F , REGAZZONI F ,et al. ALE:AES-based lightweight authenticated encryption[C]// International Workshop on Fast Software Encryption. 2013: 447-466.
|
[16] |
NIKOLIC I . TiaoXin-346[EB].
|
[17] |
HOANG V T , KROVETZ T . AEZ v5:authenticated encryption by enciphering[EB].
|
[18] |
ZHANG J , WU W , ZHENG Y . Security of SM4 against (related-key) differential cryptanalysis[C]// Information Security Practice and Experience. 2016: 65-78.
|
[19] |
BILGIN B , BOGDANOV A , KNE?EVI? M .et al Fides:lightweight authenticated cipher with side-channel resistance for constrained hardware[C]// Cryptographic Hardware and Embedded Systems - CHES 2013. 2013.
|
[20] |
BEIERLE C , JéRéMY J , STEFAN K , ,et al. The SKINNY family of block ciphers and its low-latency variant MANTIS[C]// Annual Cryptology Conference. Berlin:Springer, 2016.
|
[21] |
张建, 吴文玲 . 基于 SM4 轮函数设计的认证加密算法[J]. 电子学报, 2018,46(6): 1294-1299.
|
|
ZHANG J , WU W L . Authentication encryption based on SM4 round function[J]. Chinese Journal of Electronics, 2018,46(6): 1294-1299.
|
[22] |
DAEMEN J , RIJMEN V . The design of rijndael[M]. Berlin: SpringerPress, 2002.
|
[23] |
MATSUI M , . Linear cryptanalysis method for DES cipher[C]// Advances in Cryptology -EUROCRYPT ’93. 1994.
|
[24] |
尤加勇, 李超 . 针对 LEX 算法的截断滑动攻击[J]. 信息安全与通信保密, 2007(9): 96-98.
|
|
YOU J Y , LI C . Interruption slide attack against stream cipher lex algorithm[J]. Information Security and Communications Privacy, 2007(9): 96-98.
|
[25] |
MINAUD B , . Linear biases in AEGIS keystream[C]// Selected Areas in Cryptography. 2014: 290-305.
|