[1] |
ROGAWAY P , BELLARE M , BLACK J . OCB[J]. ACM Transactions on Information and System Security, 2003,6(3): 365-403.
|
[2] |
BELLARE M , ROGAWAY P , WAGNER D . The EAX mode of operation[C]// International Workshop on Fast Software Encryption. Berlin:Springer, 2004: 389-407.
|
[3] |
MCGREW D A , VIEGA J . The security and performance of the galois/counter mode (GCM) of operation[C]// Proceedings of International Conference on Cryptology in India. Berlin:Springer, 2004: 343-355.
|
[4] |
WU H J , PRENEEL B . AEGIS:a fast authenticated encryption algorithm[C]// International Conference on Selected Areas in Cryptography. Berlin:Springer, 2014: 185-201.
|
[5] |
BOGDANOV A , MENDEL F , REGAZZONI F ,et al. ALE:AES-based lightweight authenticated encryption[C]// International Workshop on Fast Software Encryption. Berlin:Springer, 2014: 447-466.
|
[6] |
HOANG V T , KROVETZ T , ROGAWAY P . Robust authenticated-encryption AEZ and the problem that it solves[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2015: 15-44.
|
[7] |
吴文玲, 张蕾, 郑雅菲 ,等. 分组密码 uBlock[J]. 密码学报, 2019,6(6): 690-703.
|
|
WU W L , ZHANG L , ZHENG Y F ,et al. The block cipher uBlock[J]. Journal of Cryptologic Research, 2019,6(6): 690-703.
|
[8] |
MOUHA N , WANG Q J , GU D W ,et al. Differential and linear cryptanalysis using mixed-integer linear programming[C]// International Conference on Information Security and Cryptology. Berlin:Springer, 2012: 57-76.
|
[9] |
ZABUNOV S . Digital signal processing in RadioSolariz project using SSE2[J]. Aerospace Research in Bulgaria, 2022,34: 66-71.
|
[10] |
BELLARE M , NAMPREMPRE C . Authenticated encryption:relations among notions and analysis of the generic composition paradigm[C]// Advances in Cryptology - ASIACRYPT 2000. Berlin:Springer, 2000: 531-545.
|
[11] |
ROGAWAY P . Authenticated-encryption with associated-data[C]// Proceedings of the 9th ACM Conference on Computer and Communications Security. New York:ACM Press, 2002: 98-107.
|
[12] |
IWATA T . Authenticated encryption mode for beyond the birthday bound security[C]// International Conference on Cryptology in Africa. Berlin:Springer, 2008: 125-142.
|
[13] |
SARKAR P . Pseudo-random functions and parallelizable modes of operations of a block cipher[J]. IEEE Transactions on Information Theory, 2010,56(8): 4025-4037.
|
[14] |
GRUBER M , PROBST M , TEMPELMEIER M . Persistent fault analysis of OCB,DEOXYS and COLM[C]// Proceedings of 2019 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). Piscataway:IEEE Press, 2019: 17-24.
|
[15] |
DOBRAUNIG C , EICHLSEDER M , MENDEL F ,et al. ASCON v1.2(submission to the CAESAR competition)[EB]. 2016.
|
[16] |
WU H J . ACORN:a lightweight authenticated cipher (v3)[EB]. 2016.
|
[17] |
张建, 吴文玲 . 基于 SM4 轮函数设计的认证加密算法[J]. 电子学报, 2018,46(6): 1294-1299.
|
|
ZHANG J , WU W L . Authenticated encryption based on SM4 round function[J]. Acta Electronica Sinica, 2018,46(6): 1294-1299.
|
[18] |
高国强, 李子臣 . 基于AES轮函数认证加密算法研究与设计[J]. 网络与信息安全学报, 2020,6(2): 106-115.
|
|
GAO G Q , LI Z C . Research and design of authenticated encryption algorithm based on AES round function[J]. Chinese Journal of Network and Information Security, 2020,6(2): 106-115.
|
[19] |
BORGHOFF J , KNUDSEN L R , STOLPE M . Bivium as a mixed-integer linear programming problem[C]// International Conference on Cryptography and Coding. Berlin:Springer, 2009: 133-152.
|
[20] |
TOLBA A M R . Trust-based distributed authentication method for collision attack avoidance in VANETs[J]. IEEE Access, 2018,6: 62747-62755.
|
[21] |
刘帅, 关杰, 胡斌 ,等. 基于MILP的轻量级密码算法ACE的差分分析[J]. 通信学报, 2023,44(1): 39-48.
|
|
LIU S , GUAN J , HU B ,et al. Differential analysis of lightweight cipher algorithm ACE based on MILP[J]. Journal on Communications, 2023,44(1): 39-48.
|
[22] |
吴文玲 . 认证加密算法研究进展[J]. 密码学报, 2018,5(1): 70-82.
|
|
WU W L . Research advances on authenticated encryption algorithms[J]. Journal of Cryptologic Research, 2018,5(1): 70-82.
|
[23] |
BEYNE T . A geometric approach to linear cryptanalysis[C]// International Conference on the Theory and Application of Cryptology and Information Security. Berlin:Springer, 2021: 36-66.
|
[24] |
DUNKELMAN O , KELLER N , LASRY N ,et al. New slide attacks on almost self-similar ciphers[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2020: 250-279.
|
[25] |
MINAUD B . Linear biases in AEGIS keystream[C]// International Conference on Selected Areas in Cryptography. Berlin:Springer, 2014: 290-305.
|
[26] |
YUAN Z , WANG W , JIA K T ,et al. New birthday attacks on some MACs based on block ciphers[C]// Annual International Cryptology Conference. Berlin:Springer, 2009: 209-230.
|
[27] |
GOUDARZI D , JEAN J , K?LBL S , ,et al. Pyjamask:block cipher and authenticated encryption with highly efficient masked implementation[J]. IACR Transactions on Symmetric Cryptology, 2020,2020: 31-59.
|
[28] |
贺水喻, 魏悦川, 潘峰 ,等. 对认证加密算法Pyjamask的伪造攻击[J]. 计算机工程与科学, 2022,44(12): 2140-2145.
|
|
HE S Y , WEI Y C , PAN F ,et al. Forgery attack on the authenticated encryption algorithm Pyjamask[J]. Computer Engineering and Science, 2022,44(12): 2140-2145.
|
[29] |
张国双, 陈晓, 王安 ,等. 面向ACORN v3消息认证码的随机差分故障分析[J]. 密码学报, 2021,8(3): 498-520.
|
|
ZHANG G S , CHEN X , WANG A ,et al. Random differential fault attack for ACORN v3 message authentication code[J]. Journal of Cryptologic Research, 2021,8(3): 498-520.
|
[30] |
WANG D , CHENG H B , WANG P ,et al. Zipf’s law in passwords[J]. IEEE Transactions on Information Forensics and Security, 2017,12(11): 2776-2791.
|
[31] |
王平, 汪定, 黄欣沂 . 口令安全研究进展[J]. 计算机研究与发展, 2016,53(10): 2173-2188.
|
|
WANG P , WANG D , HUANG X Y . Advances in password security[J]. Journal of Computer Research and Development, 2016,53(10): 2173-2188.
|