[1] |
BOGDANOV A , KNUDSEN L R , LEANDER G ,et al. PRESENT:an ultra-lightweight block cipher[C]// Internation Workshop on Cryptographic Hardware and Embedded Systems. 2007: 450-466.
|
[2] |
DE C , DUNKELMAN O,KNE?EVI? M . KATAN and KTANTAN-a family of small and efficient hardware-oriented block ciphers[M]// Cryptographic Hardware and Embedded Systems-CHES 2009. Springer,Berlin,Heidelberg, 2009: 272-288.
|
[3] |
WU W , ZHANG L . LBlock:a lightweight block cipher[C]// Applied Cryptography and Network Security,9th InternationalConference. 2011: 327-344.
|
[4] |
GUO J , PEYRIN T , POSCHMANN A ,et al. The LED block cipher[M]// Cryptographic Hardware and Embedded Systems. 2011: 326-341.
|
[5] |
BORGHOFF J , CANTEAUT A , GüNEYSU T ,et al. PRINCE-A low-latency block cipher for pervasive computing applications[C]// International Conference on the Theory and Application of Cryptology and Information Security. 2012: 208-225.
|
[6] |
BEAULIEU R , SHORS D , SMITH J ,et al. The simon and speck families of lightweight block ciphers[J]. Cryptology ePrint Archive, 2013.
|
[7] |
ZABA M R , JAMIL N , RUSLI M E ,et al. I-PRESENT:an involutive lightweight block cipher[J]. Journal of Information Security, 2014,5(3): 114-122.
|
[8] |
KHOVRATOVICH D , RECHBERGER C , SAVELIEVA A . Bicliques for preimages:attacks on skein-512 and the SHA-2 family[C]// International Conference on FAST Software Encryption. 2012: 244-263.
|
[9] |
BOGDANOV A , KHOVRATOVICH D , RECHBERGER C . Biclique cryptanalysis of the full AES[C]// The Theory and Application of Cryptology and Information Security. 2011: 344-371.
|
[10] |
陈少真, 刘佳 . 对全轮3D分组密码算法的Biclique攻击[J]. 计算机学报. 2014,37(5): 1063-1070.
|
|
CHEN S Z , LIU J . Biclique cryptanalysis on full 3D block cipher[J]. Chinese Journal of Computers, 2014,37(5): 1063-1070.
|
[11] |
MALA H . Biclique-based cryptanalysis of the block cipher SQUARE[J]. Iet Information Security, 2014,8(3): 207-212.
|
[12] |
HONG D , KOO B , KWON D . Biclique attack on the Full HIGHT[C]// International Conference on Information Security and Cryptology. 2011: 365-374.
|
[13] |
WANG Y , WU W , YU X . Biclique cryptanalysis of reduced-round piccolo block cipher[C]// International Conference on Information Security Practice and Experience. 2012: 337-352.
|
[14] |
CHEN S Z , XU T M , CHEN S Z ,et al. Biclique attack of the full ARIA-256[C]// IACR Cryptology ePrint Archive. 2012.
|
[15] |
WANG Y , WU W , YU X ,et al. Security on LBlock against biclique cryptanalysis[M]// Information Security Applications. 2012: 1-14.
|
[16] |
COBAN M , KARAKOC F , BOZTAS ? . Biclique cryptanalysis of TWINE[C]// CANS. 2012: 43-55.
|
[17] |
KHOVRATOVICH D , LEURENT G , RECHBERGER C . Narrowbicliques:cryptanalysis of full IDEA[C]// International Conference on Theory and Applications of Cryptographic Techniques. 2012: 392-410.
|
[18] |
AHMADIAN Z , SALMASIZADEH M , AREF M R . Biclique cryptanalysis of the full-round KLEIN block cipher[J]. Information Security Iet, 2015,9(5): 294-301.
|
[19] |
SHAKIBA M , DAKHILALIAN M , MALA H . Non-isomorphic biclique cryptanalysis and its application to full-round mCrypton[J]. IACR Cryptology ePrint Archive, 2013:141.
|
[20] |
CANTEAUT A , NAYA-PLASENCIA M , VAYSSIERE B . Sieve-inthe-middle:improved MITM attacks[M]// Cryptology-CRYPTO 2013. Springer,Berlin,Heidelberg, 2013: 222-240.
|