[1] |
KNUDSEN L R . Deal - a 128 bit block cipher[J]. Complexity, 2004.
|
[2] |
BIHAM E , BIRYUKOV A , SHAMIR A . Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials[C]// Advances in Cryptology — EUROCRYPT ’99. 1999: 12-23.
|
[3] |
BIHAM E , BIRYUKOV A , SHAMIR A . Miss in the middle attacks on IDEA and Khufu[C]// The International Workshop on FAST Software Encryption. 1999: 124-138.
|
[4] |
PHAN C W . Impossible differential cryptanalysis of 7-round advanced encryption standard(AES)[J]. Information Processing Letters, 2004,91(1): 33-38.
|
[5] |
LU J , DUNKELMAN O , KELLER N ,et al. New impossible differential attacks on AES[C]// Progress in Cryptology-INDOCRYPT. 2008: 279-293.
|
[6] |
BOURA C , NAYA-PLASENCIA M , SUDER V . Scrutinizing and improving impossible differential attacks:applications to CLEFIA,camellia,lblock and simon[C]// The International Conference on the Theory and Application of Cryptology and Information Security. 2014: 179-199.
|
[7] |
CHEN J , FUTA Y , MIYAJI A ,et al. Improving impossible differential cryptanalysis with concrete investigation of key scheduling algorithm and its application to lblock[C]// The 8th International Conference on Network and System Security. 2014: 184-197.
|
[8] |
BOGDANOV A , RIJMEN V . Linear hulls with correlation zero and linear cryptanalysis of block ciphers[J]. Designs Codes &Cryptography, 2014,70(3): 369-383.
|
[9] |
YI W T , CHEN S Z . Improved integral and zero-correlation linear cryptanalysis of reduced-round CLEFIA block cipher[J]. IACR Cryptology ePrint Archive, 2016: 149.
|
[10] |
SOLEIMANY H , NYBERG K . Zero-correlation linear cryptanalysis of reduced-round LBlock[J]. Designs Codes &Cryptography, 2014,73(2): 683-698.
|
[11] |
XU H , JIA P , HUANG G ,et al. Multidimensional zero-correlation linear cryptanalysis on 23-round LBlock-s[M]// Information and Communications Security. Berlin: SpringerPress, 2015.
|
[12] |
ZHANG K , GUAN J , HU B ,et al. Security evaluation on simeck against zero correlation linear cryptanalysis[J]. IACR Cryptology ePrint Archive, 2015.
|
[13] |
KIM J , HONG S , SUNG J ,et al. Impossible differential cryptanalysis for block cipher structures[C]// The 4th International Conference on Cryptology. 2003: 82-96.
|
[14] |
LUO Y , LAI X , WU Z ,et al. A unified method for finding impossible differentials of block cipher structures[J]. Information Sciences, 2014,263(1): 211-220.
|
[15] |
WU S , WANG M . Automatic search of truncated impossible differentials for word-oriented block ciphers[C]// The International Conference on Cryptology. 2012: 283-302.
|
[16] |
LIPMAA H , MORIAI S . Efficient algorithms for computing differential properties of addition[C]// The 8th International Workshop on Fast Software Encryption. 2001: 336-350.
|
[17] |
WALLéN J , . Linear approximations of addition modulo 2n[C]// The 10th International Workshop on Fast Software Encryption(2003). 2003: 261-273.
|
[18] |
K?LBL S , LEANDER G , TIESSEN T . Observations on the SIMON block cipher family[C]// Advances in Cryptology - CRYPTO. 2015: 161-185.
|
[19] |
WHEELER D J , NEEDHAM R M . Tea,a tiny encryption algo-rithm[M]// Fast Software Encryption. Berlin : SpringerPress, 1994: 363-366.
|
[20] |
BEAULIEU R , SHORS D , SMITH J ,et al. The simon and speck families of lightweight block ciphers[J]. IACR Cryptology ePrint Archive, 2013(6): 404.
|