[1] |
JUNOD P , VAUDENAY S , SHACHAM H . FOX:a new family of block ciphers[C]// Lecture Notes in Computer Science,2004. c2004:131-146.
|
[2] |
WU W , ZHANG W , FENG D . cryptanalysis of reduced FOX block cipher[J]. Lecture Notes in Computer Science, 2005,3935(1): 229-241.
|
[3] |
WU Z M , LAI X J , ZHU B , et al. Impossible differential cryptanalysis of FOX[EB/OL]. IACR Cryptology ePrint Archive, 2009.
|
[4] |
CHEN J , HU Y P , ZHANG Y Y , et al. Differential collision attack on re-duced fox block cipher[J]. China Communications, 2012,9(7): 71-76.
|
[5] |
郭瑞, 金晨辉 . 低轮 FOX64 算法的零相关-积分分析[J]. 电子与信息学报, 2015,37(2):417-422. GUO R , JIN C H . Integral cryptanalysis of reduced round FOX64[J]. Jour-nal of Electronics & Information Technology, 2015,37(2):417-422.
|
|
伊文坛, 陈少真 . FOX 密码的多维零相关线性分析[J]. 密码学报, 2015,2(1):27-39. YI W T , CHEN S Z . Multidimensional zero-correlation linear attacks on Fox block cipher[J]. Journal of Cryptologic Research, 2015,2(1):27-39.
|
[7] |
ISOBE T , SHIBUTANI K . Improved all-subkeys recovery attacks on FOX,KATAN and SHACAL-2 block ciphers[C]// FSE 2014. c2014:104-126.
|
[8] |
DEMIRCI H , SEL?UK A . A Meet-in-the-middle attack on 8-round AES[C]// Lecture Motes in Computer Science. Lausanne,Switzerland c2008:116-126.
|
[9] |
DUNKELMAN O , KELLER N , SHAMIR A . Improved single-key attacks on 8-round AES-192 and AES-256[J]. Journal of Cryptology, 2010,28(3): 158-176.
|
[10] |
DERBEZ P , FOUQUE P A , JEAN J . Improved key recovery attacks on reduced-round AES in the single-key setting[J]. Lecture Notes in Computer Science, 2013,788: 371-387.
|
[11] |
LI L B , JIA K T , WANG X Y . Improved single-key attacks on 9-round AES-192/256[M]// Fast Software Encryption. Springer Berlin Heidel-berg c2014:127-146.
|