[1] |
KWON D , KIM J . Specification of ARIA[EB/OL]. . 2003.08.
|
[2] |
BIRYUKOV A , CANNIERE C , et al. Security and performance analysis of ARIA[EB/OL]. . 2004.07.
|
[3] |
WU W , ZHANG W , FENG D . Impossible differential cryptanalysis of reduced-round ARIA and Camellia[J]. Journal of Computer Science and Technology, 2007,22(3):449-456.
|
[4] |
LI S , SONG C . Improved impossible differential cryptanalysis of ARIA[A]. ISA 2008, IEEE Computer Society[C]. Los Alamitos, 2008.129-132.
|
[5] |
FLEISCHMANN E , GORSKI M , LUCKS S . Attacking reduced rounds of the ARIA block cipher[EB/OL]. . 2009.07.
|
[6] |
LI Y , WU W , ZHANG L . Integral attacks on reduced-round ARIA block cipher[A]. ISPEC 2010[C]. 2010.19-29.
|
[7] |
DU C , CHEN J . Impossible differential cryptanalysis of ARIA reduced to 7 rounds[A]. CANS 2010[C]. 2010.20-30.
|
[8] |
TANG X , SUN B , LI R . A meet-in-the-middle attack on re-duced-round ARIA[J]. Journal of Systems and Software, 2011,84(10):1685-1692.
|
[9] |
苏崇茂 . 7轮ARIA-256的不可能差分新攻击[J]. 计算机应用, 2012,32(1):45-48. SU C M . New impossiblediferential attack on 7-round reduced ARIA[J]. Journal of Computer Applications, 2012,32(1):45-48.
|
[10] |
ZHANG W , LIU F , LIU X , MENG S . Differential fault analysis and meet-in-the-middle attack on the block cipher KATAN32[J]. Journal of Shanghai Jiaotong University (Science), 2013,18(2):147-152.
|
[11] |
LU J , WEI Y . The higher-order meet-in-the-middle attack and its application to the camellia block cipher[A]. INDOCRYPT 2012[C]. 2012.244-264.
|
[12] |
LU J , WEI Y . Meet-in-the-middle attack on reduced versions of the camellia block cipher[A]. IWSEC 2012[C]. 2012.197-215.
|
[13] |
DUNKELMAN O , KELLER N , SHAMIR A . Improved single-key attacks on 8-round AES[A]. ASIACRYPT 2010[C]. 2010.158-176.
|
[14] |
JOHANSSON T , NGUYEN P . Improved key recovery attacks on reduced-round AES in the single-key setting[A]. EUROCRYPT 2013[C]. 2013.371-387.
|
[15] |
DU C , CHEN J . Improved meet-in-the-middle attacks on ARIA[A]. ISAI 2010[C]. 2010.306-310.
|