[1] |
JOAN D , VINCENT R . The Design of Rijndael:AES—the Advanced Encryption Standard[M]. Springer-Verlag, 2002.
|
[2] |
GUO J , THOMAS P , AXEL P . The photon family of lightweight hash functions[EB/OL]. , 2011.
|
[3] |
GUO J , THOMAS P , AXEL P . The Photon family of lightweight hash functions[A]. Proc of the Advances in Cryptology-CAYPTO 2011[C]. Santa Barbara,CA,USA, 2011. 222-239.
|
[4] |
WU H . The Hash Function JH[EB/OL]. , 2008.
|
[5] |
RIJMEN V , TOZ D,VANCI . Rebound attack on reduced-round versions of JH[A]. Proc of the Fast Software Encryption-FSE 2010[C]. Seoul,Korea, 2010. 286-303.
|
[6] |
TURAN M-S , UYAN E . Practical near–collisions for reduced round blake,fugue,Hamsi and JH[EB/OL]. , 2010.
|
[7] |
N-PLASENCIA M . How to improve rebound attacks[A]. Proc of the Advances in Cryptology-CAYPTO 2011[C]. Santa Barbara,CA,USA, 2011. 188-205.
|
[8] |
BOURA C , CANTEAUT A . On the influence of the algebraic degree of F-1 on the algebraic degree of G circ F[EB/OL]. , 2011.
|
[9] |
LAI X J . Higher order derivatives and differential cryptanalysis[A]. Proc of Symposium on Communication,Coding and Cryptography,in honor o]James L.Massey on the Occasion of His 60'th Birthday[C]. Monte-Verita,Ascona,Switzerland, 1994. 10-13.
|
[10] |
KNUDSEN L R . Truncated and higher order differentials[A]. Proc of the Fast Software Encryption-FSE 1994[C]. Leuven,Belgium, 1995. 196-211.
|
[11] |
AUMASSON J-P , MEIER W . Zero-sum distinguishers for reduced keccak-f and for the core functions of luffa and hamsi[EB/OL]. , 2009.
|
[12] |
BOURA C , CANTEAUT A . Zero-sum distinguishers for iterated permutations and application to KECCAK-f and Hamsi-256[A]. Proc of the Selected Areas in Cryptography-SAC 2010[C]. Waterloo,Ontario,Canada, 2011. 1-17.
|
[13] |
BOURA C , CANTEAUT A,CANNIèRE C D . Higher-order differential properties of Keccak and Luffa[A]. Proc of the Fast Software Encryption-FSE 2011[C]. Lyngby,Denmark, 2011. 252-269.
|
[14] |
AUMASSON J-P,K?SPER E , KNUDSEN L R , et al . Distinguishers for the compression function and output transformation of hamsi-256[A]. Proc of the Information Security and Privacy-ACISP 2010[C]. Sydney,Australia, 2010. 87-103.
|
[15] |
KNUDSEN L R , WAGNER D . Integral cryptanalysis[A]. Proc of the Fast Software Encryption-FSE 2002[C]. Leuven,Belgium, 2002. 112-127.
|
[16] |
DAEMEN J , KNUDSEN LR , RIJMEN V . The block cipher square[A]. Proc of the Fast Software Encryption-FSE 1997[C]. Haifa,Israel, 1997. 149-165.
|
[17] |
FERGUSON N,KELSEY J , LUCKS S , et a l . Improved cryptanalysis of rijndael[A]. Proc of the Fast Software Encryption-FSE 2000[C]. New York,NY,USA, 2001. 213-230.
|
[18] |
GALICE S , MINIER M . Improving integral attacks against rijndael256 up to 9 rounds[A]. Proc of the Progress in Cryptology – AFRICACRYPT 2008[C]. Casablanca,Morocco, 2008. 1-15.
|