[1] |
BOGDANOV A , KNUDSEN L R , LEANDER G ,et al. PRESENT:an ultra-lightweight block cipher[C]// Proceedings of Cryptographic Hardware and Embedded Systems. Berlin:Springer, 2007: 450-466.
|
[2] |
GUO J , PEYRIN T , POSCHMANN A ,et al. The LED block cipher[C]// Proceedings of Cryptographic Hardware and Embedded Systems. Berlin:Springer, 2011: 326-341.
|
[3] |
WU W L , ZHANG L . LBlock:a lightweight block cipher[C]// Proceedings of Applied Cryptography and Network Security. Berlin:Springer, 2011: 327-344.
|
[4] |
KNUDSEN L , LEANDER G , POSCHMANN A . PRINT cipher:a block cipher for IC-printing[C]// Proceedings of Cryptographic Hardware and Embedded Systems. Berlin:Springer, 2010: 16-32.
|
[5] |
LALLEMAND V , NAYA-PLASENCIA M . Cryptanalysis of KLEIN[C]// Proceedings of Fast Software Encryption. Berlin:Springer, 2014: 451-470.
|
[6] |
BEAULIEU R , TREATMAN-CLARKS , SHORS D ,et al. The SIMON and SPECK lightweight block ciphers[C]// Proceedings of 2015 52nd ACM/EDAC/IEEE Design Automation Conference. Piscataway:IEEE Press, 2015: 1-6.
|
[7] |
DAEMEN J , KNUDSEN L , RIJMEN V . The block cipher square[C]// Proceedings of Fast Software Encryption. Berlin:Springer, 1997: 149-165.
|
[8] |
LI Y J , WU W L . Improved integral attacks on Rijndael[J]. Journal of Information Science and Engineering, 2011,27(6): 2031-2045.
|
[9] |
LI Y J , WU W L , ZHANG L . Integral attacks on reduced-round ARIA block cipher[C]// Proceedings of Information Security Practice and Experience. Berlin:Springer, 2010: 19-29.
|
[10] |
ZABA M R , RADDUM H , HENRICKSEN M ,et al. Bit-pattern based integral attack[C]// Proceedings of Fast Software Encryption. Berlin:Springer, 2008: 363-381.
|
[11] |
XIA T F , ZHAO Z Y , LI W ,et al. A new kind of integral cryptanalysis for the round-reduced AES[J]. Electrical Engineering and Computer Science, 2019,3: 6-9.
|
[12] |
LI H , REN J J , CHEN S Z . Improved integral attack on reduced-round SIMECK[J]. IEEE Access, 2019,7: 118806-118814.
|
[13] |
ELSHEIKH M , YOUSSEF A M . Integral cryptanalysis of reduced-round tweakable TWINE[C]// Proceedings of Cryptology and Network Security. Berlin:Springer, 2020: 485-504.
|
[14] |
DUO L , LI C , FENG K Q . Square like attack on Camellia[C]// Proceedings of Cryptology and Network Security. Berlin:Springer, 2007: 269-283.
|
[15] |
LI Y J , WU W L , ZHANG L T ,et al. Improved integral attacks on reduced round Camellia[EB].[2011-04-11].
|
[16] |
CHEN L L , WANG G L , ZHANG G Y . MILP-based related-key rectangle attack and its application to GIFT,Khudra,MIBS[J]. The Computer Journal, 2019,62(12): 1805-1821.
|
[17] |
XIANG Z J , ZHANG W T , BAO Z Z ,et al. Applying MILP method to searching integral distinguishers based on division property for 6 lightweight block ciphers[C]// Proceedings of Advances in Cryptology. Berlin:Springer, 2016: 648-678.
|
[18] |
ISOBE T , SHIBUTANI K . Security analysis of the lightweight block ciphers XTEA,LED and Piccolo[C]// Proceedings of Information Security and Privacy. Berlin:Springer, 2012: 71-86.
|
[19] |
MENDEL F , RIJMEN V , TOZ D ,et al. Differential analysis of the LED block cipher[C]// Proceedings of Advances in Cryptology. Berlin:Springer, 2012: 190-207.
|
[20] |
NIKOLI? I , WANG L , WU S . Cryptanalysis of round-reduced LED[C]// Proceedings of Fast Software Encryption. Berlin:Springer, 2013: 112-129.
|
[21] |
DINUR I , DUNKELMAN O , KELLER N ,et al. Key recovery attacks on 3-roundeven-mansour,8-Step LED-128,and full AES2[C]// Proceedings of Advances in Cryptology. Berlin:Springer, 2013: 337-356.
|
[22] |
MAXIMOV A , JOHANSSON T . A linear distinguishing attack on scream[J]. IEEE Transactions on Information Theory, 2007,53(9): 3127-3144.
|
[23] |
SUN L , WANG W , WANG M . More accurate differential properties of LED64 and Midori64[J]. IACR Transactions on Symmetric Cryptology, 2018(3): 93-123.
|