[1] |
SINGH R , BHUSHAN B . Evolving intelligent system for trajectory tracking of unmanned aerial vehicles[J]. IEEE Transactions on Automation Science and Engineering, 2022,19(3): 1971-1984.
|
[2] |
ALRAWI O , LEVER C , ANTONAKAKIS M ,et al. SoK:security evaluation of home-based IoT deployments[C]// Proceedings of IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2019: 1362-1380.
|
[3] |
吴武飞, 李仁发, 曾刚 ,等. 智能网联车网络安全研究综述[J]. 通信学报, 2020,41(6): 161-174.
|
|
WU W F , LI R F , ZENG G ,et al. Survey of the intelligent and connected vehicle cybersecurity[J]. Journal on Communications, 2020,41(6): 161-174.
|
[4] |
王圣宝, 周鑫, 文康 ,等. 适用于智能电网的三方认证密钥交换协议[J]. 通信学报, 2023,44(02): 210-218.
|
|
WANG S B , ZHOU X , WEN K ,et al. Tripartite authenticated key exchange protocol for smart grid[J]. Journal on Communications, 2023,44(2): 210-218.
|
[5] |
NAITO Y , SASAKI Y , SUGAWARA T . Lightweight authenticated encryption mode suitable for threshold implementation[C]// Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2020: 705-735.
|
[6] |
CHENG J , GUO S , HE J . An extended type-1 generalized Feistel networks:lightweight block cipher for IoT[J]. IEEE Internet of Things Journal, 2022,9(13): 11408-11421.
|
[7] |
CHENG H , GROSSSCH?DL J , MARSHALL B ,et al. RISC-V instruction set extensions for lightweight symmetric cryptography[J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022(1): 193-237.
|
[8] |
ZHU D , ZHANG R , OU L ,et al. Low-latency design and implementation of the squaring in class groups for verifiable delay function using redundant representation[J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022(1): 438-462.
|
[9] |
ALBRECHT M R , DRIESSEN B , KAVUN E B ,et al. Block ciphers –focus on the linear layer (feat.PRIDE)[C]// Proceedings of Advances in Cryptology. Berlin:Springer, 2014: 57-76.
|
[10] |
伊文坛, 田亚, 陈少真 . 减缩轮PRIDE算法的线性分析[J]. 电子学报, 2017,45(2): 468-476.
|
|
YIN W T , TIAN Y , CHEN S Z . Linear cryptanalysis of reduced-round PRIDE block cipher[J]. Chinese Journal of Electronics, 2017,45(2): 468-276.
|
[11] |
LALLEMAND V , RASOOLZADEH S . Differential cryptanalysis of 18-round PRIDE[C]// Proceedings of International Conference on Cryptology in India. Berlin:Springer, 2017: 126-146.
|
[12] |
PAL D , MANDAL U , DAS A ,et al. Deep learning based differential classifier of PRIDE and RC5[C]// Proceedings of International Conference on Applicat ions and Techniques in Information Security. Berlin:Springer, 2023: 46-58.
|
[13] |
YANG Q , HU L , SUN S ,et al. Improved differential analysis of block cipher PRIDE[C]// Proceedings of International Conference on Information Security Practice and Experience. Berlin:Springer, 2015: 209-219.
|
[14] |
BONEH D , DEMILLO R A , LIPTON R J . On the importance of checking cryptographic protocols for faults[C]// Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 1997: 37-51.
|
[15] |
FUHR T , JAULMES E , LOMNE V ,et al. Fault attacks on AES with faulty ciphertexts only[C]// Proceedings of Workshop on Fault Diagnosis and Toler ance in Cryptography. Piscataway:IEEE Press, 2013: 108-118.
|
[16] |
CLAVIER C . Secret external encodings do not prevent transient fault analysis[C]// Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems. Berlin:Springer, 2007: 181-194.
|
[17] |
BIHAM E , SHAMIR A . Differential fault analysis of secret key cryptosystems[C]// Proceedings of Annual International Cryptology Conference. Berlin:Springer, 1997: 513-525.
|
[18] |
DERBEZ P , FOUQUE P A , LERESTEUX D . Meet-in-the-middle and impossible differential fault analysis on AES[C]// Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems. Berlin:Springer, 2011: 274-291.
|
[19] |
ZHANG F , LOU X , ZHAO X ,et al. Persistent fault analysis on block ciphers[J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018(3): 150-172.
|
[20] |
JANA A , PAUL G . Differential fault attack on PHOTON-Beetle[C]// Proceedings of Workshop on Attacks and Solutions in Hardware Security. New York:ACM Press, 2022: 25-34.
|
[21] |
ZHANG F , FENG T , LI Z ,et al. Free fault leakages for deep exploitation:algebraic persistent fault analysis on lightweight block ciphers[J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022(2): 289-311.
|
[22] |
王永娟, 樊昊鹏, 代政一 ,等. 侧信道攻击与防御技术研究进展[J]. 计算机学报, 2023,46(1): 202-228.
|
|
WANG Y J , FAN H P , DAI Z Y ,et al. Advances in side channel attacks and countermeasures[J]. Chinese Journal of Computers, 2023,46(1): 202-228.
|
[23] |
李玮, 刘春, 谷大武 ,等. Saturnin-Short 轻量级认证加密算法的统计无效故障分析[J]. 通信学报, 2023,44(4): 167-175.
|
|
LI W , LIU C , GU D W ,et al. Statistical ineffective fault analysis of the lightweight authenticated cipher algorithm Saturnin-Short[J]. Journal on Communications, 2023,44(4): 167-175.
|
[24] |
LI W , LIAO L , GU D ,et al. Ciphertext-only fault analysis on the LED lightweight cryptosystem in the Internet of things[J]. IEEE Transactions on Dependable and Secure Computing, 2019,16(3): 454-461.
|
[25] |
LI W , LI J , GU D ,et al. Statistical fault analysis of the Simeck lightweight cipher in the ubiquitous sensor networks[J]. IEEE Transactions on Information Forensics and Security, 2021,16: 4224-4233.
|
[26] |
BIHAM E , BIRYUKOV A , SHAMIR A . Miss in the middle attacks on IDEA and Khufu[C]// Proceedings of International Workshop on Fast Software Encryption. Berlin:Springer, 1999: 124-138.
|
[27] |
BIHAM E , BIRYUKOV A , SHAMIR A . Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials[J]. Journal of Cryptology, 2005,18(4): 291-311.
|
[28] |
MOON D , HWANG K , LEE W ,et al. Impossible differential cryptanalysis of reduced round XTEA and TEA[C]// Proceedings of International Workshop on Fast Software Encryption. Berlin:Springer, 2002: 49-60.
|
[29] |
CHEN J , HU Y , ZHANG Y . Impossible differential cryptanalysis of advanced encryption standard[J]. Science China Information Sciences, 2007,50(3): 342-350.
|
[30] |
WU W , ZHANG L , ZHANG W . Improved impossible differential cryptanalysis of reduced-round Camellia[C]// Proceedings of International Workshop on Selected Areas in Cryptography. Berlin:Springer, 2009: 442-456.
|
[31] |
BOURA C , NAYA-PLASENCIA M , SUDER V . Scrutinizing and improving impossible differential attacks:applications to CLEFIA,Camellia,LBlock and Simon[C]// Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. Berlin:Springer, 2014: 179-199.
|
[32] |
LIU Y , SHI Y , GU D ,et al. Improved impossible differential cryptanalysis of large-block Rijndael[J]. Science China Information Sciences, 2019,62(3): 1-14.
|
[33] |
DU J , WANG W , LI M ,et al. Related-tweakey impossible differential attack on QARMA-128[J]. Science China Information Sciences, 2019,62(3): 15-26.
|
[34] |
ZHANG L , WU W , MAO Y . Impossible differential cryptanalysis on reduced-round PRINCEcore[C]// Proceedings of International Conference on Inform ation Security and Cryptology. Berlin:Springer, 2023: 61-77.
|
[35] |
BIHAM E , GRANBOULAN L , NGUY?N P Q . Impossible fault analysis of RC4 and differential fault analysis of RC4[C]// Proceedings of Internation al Workshop on Fast Software Encryption. Berlin:Springer, 2005: 359-367.
|
[36] |
LI W , RIJMEN V , TAO Z ,et al. Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs[J]. Science China Information Sciences, 2018,61(3): 032110.
|
[37] |
REED I . A class of multiple-error-correcting codes and the decoding scheme[J]. Transactions of the IRE Professional Group on Information Theory, 1954,4(4): 38-49.
|
[38] |
WILKS S S . The large-sample distribution of the likelihood ratio for testing composite hypotheses[J]. The Annals of Mathematical Statistics, 1938,9(1): 60-62.
|
[39] |
PEARSON K X . On the criterion that a given system of deviations from the probable in the case of a correlated system of variables is such that it can be reasonably supposed to have arisen from random sampling[J]. The London,Edinburgh,and Dublin Philosophical Magazine and Journal of Science, 1900,50(302): 157-175.
|