[1] |
National Bureau of Standards. Data encryption standard[S]. 1977.
|
[2] |
DAEMEN J , RIJMEN V . AES proposal:Rijndael[R]. 1999.
|
[3] |
WHEELER D J , NEEDHAM R M . TEA,a tiny encryption algorithm[M]. Berlin: Springer, 1995.
|
[4] |
BERNSTEIN D J . The Salsa20 family of stream ciphers[M]. Berlin: Springer, 2008.
|
[5] |
AUMASSON J P , BERNSTEIN D J . SipHash:a fast short-input PRF[C]// Proceedings of International Conference on Cryptology in India. Berlin:Springer, 2012: 489-508.
|
[6] |
BEAULIEU R , TREATMAN-CLARK S , SHORS D ,et al. The SIMON and SPECK lightweight block ciphers[C]// Proceedings of 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC). Piscataway:IEEE Press, 2015: 1-6.
|
[7] |
HONG D , LEE J K , KIM D C ,et al. LEA:a 128-bit block cipher for fast encryption on common processors[C]// Proceedings of International Workshop on Information Security Applications. Berlin:Springer, 2014: 3-27.
|
[8] |
MOUHA N , MENNINK B , HERREWEGE A V ,et al. Chaskey:an efficient MAC algorithm for 32-bit microcontrollers[C]// Proceedings of International Conference on Selected Areas in Cryptography. Berlin:Springer, 2014: 306-323.
|
[9] |
BIHAM E , SHAMIR A . Differential cryptanalysis of DES-like cryptosystems[C]// Advances in Cryptology-CRYPTO’ 90. Berlin:Springer, 1991: 2-21.
|
[10] |
MATSUI M . Linear cryptanalysis method for DES cipher[M]. Berlin: Springer, 1994.
|
[11] |
MOUHA N , WANG Q J , GU D W ,et al. Differential and linear cryptanalysis using mixed-integer linear programming[C]// Proceedings of International Conference on Information Security and Cryptology. Berlin:Springer, 2012: 57-76.
|
[12] |
MASSACCI F , MARRARO L . Logical cryptanalysis as a SAT problem[J]. Journal of Automated Reasoning, 2000,24(1): 165-203.
|
[13] |
BIRYUKOV A , VELICHKOV V . Automatic search for differential trails in ARX ciphers[C]// Proceedings of Cryptographers’ Track at the RSA Conference. Berlin:Springer, 2014: 227-250.
|
[14] |
SONG L , HUANG Z J , YANG Q Q . Automatic differential analysis of ARX block ciphers with application to SPECK and LEA[C]// Proceedings of Australasian Conference on Information Security and Privacy. Berlin:Springer, 2016: 379-394.
|
[15] |
BIRYUKOV A , VELICHKOV V , CORRE Y L . Automatic search for the best trails in ARX:application to block cipher speck[C]// Proceedings of International Conference on Fast Software Encryption. Berlin:Springer, 2016: 289-310.
|
[16] |
FU K , WANG M Q , GUO Y H ,et al. MILP-based automatic search algorithms for differential and linear trails for SPECK[C]// Proceedings of International Conference on Fast Software Encryption. Berlin:Springer, 2016: 268-288.
|
[17] |
LIPMAA H , MORIAI S . Efficient algorithms for computing differential properties of addition[C]// Proceedings of Fast Software Encryption. Berlin:Springer, 2002: 336-350.
|
[18] |
ZHANG Y J , SUN S W , CAI J H ,et al. Speeding up MILP aided differential characteristic search with Matsui’s strategy[C]// Proceedings of International Conference on Information Security. Berlin:Springer, 2018: 101-115.
|
[19] |
SUN L , WANG W , WANG M . Accelerating the search of differential and linear characteristics with the SAT method[J]. IACR Transactions on Symmetric Cryptology, 2021(1): 269-315.
|
[20] |
WANG S P , FENG D , HU B ,et al. The simplest SAT model of combining Matsui’s bounding conditions with sequential encoding method[J]. IACR Cryptol ePrint Arch,2022, 2022:626.
|
[21] |
LIU Y W , WANG Q J , RIJMEN V . Automatic search of linear trails in ARX with applications to SPECK and Chaskey[C]// Proceedings of International Conference on Applied Cryptography and Network Security. Berlin:Springer, 2016: 485-499.
|