[1] |
SHIBUTANI K , ISOBE T , HIWATARI H ,et al. Piccolo:an ultra-lightweight blockcipher[C]// International Workshop on Cryptographic Hardware and Embedded Systems. Berlin:Springer, 2011: 342-357.
|
[2] |
ISOBE T , SHIBUTANI K . Security analysis of the lightweight block ciphers XTEA,LED and Piccolo[C]// Proceedings of Australasian Conference on Information Security and Privacy. Berlin:Springer, 2012: 71-86.
|
[3] |
AZIMI S A , AHMADIAN Z , MOHAJERI J ,et al. Impossible differential cryptanalysis of Piccolo lightweight block cipher[C]// Proceedings of 2014 11th International ISC Conference on Information Security and Cryptology. Piscataway:IEEE Press, 2014: 89-94.
|
[4] |
FU L S , JIN C H , LI X R . Multidimensional zero-correlation linear cryptanalysis of lightweight block cipher Piccolo-128[J]. Security and Communication Networks, 2016,9(17): 4520-4535.
|
[5] |
TOLBA M , ABDELKHALEK A , YOUSSEF A M . Meet-in-the-middle attacks on reduced round piccolo[C]// Proceedings of Lightweight Cryptography for Security and Privacy. Berlin:Springer, 2016: 3-20.
|
[6] |
LIU Y , CHENG L , LIU Z Q ,et al. Improved meet-in-the-middle attacks on reduced-round Piccolo[J]. Science China Information Sciences, 2017,61(3): 1-13.
|
[7] |
ASHUR T , DUNKELMAN O , MASALHA N . Linear cryptanalysis reduced round of piccolo-80[C]// Proceedings of Cyber Security Cryptography and Machine Learning. Berlin:Springer, 2019: 16-32.
|
[8] |
LIU Y , CHENG L , ZHAO F Y ,et al. New analysis of reduced-version of piccolo in the single-key scenario[J]. KSII Transactions on Internet and Information Systems, 2019,13(9): 4727-4741.
|
[9] |
GROVER L K . A fast quantum mechanical algorithm for database search[C]// Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing. New York:ACM Press, 1996: 212-219.
|
[10] |
SIMON D . On the power of quantum computation[J]. SIAM Journal on Computing, 1997,26(5): 1474-1483.
|
[11] |
ZHANDRY M . How to construct quantum random functions[C]// Proceedings of 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science. Piscataway:IEEE Press, 2012: 679-687.
|
[12] |
KAPLAN M , LEURENT G , LEVERRIER A ,et al. Quantum differential and linear cryptanalysis[J]. IACR Transactions on Symmetric Cryptology, 2016,1: 71-94.
|
[13] |
KUWAKADO H , MORII M . Quantum distinguisher between the 3-round Feistel cipher and the random permutation[C]// Proceedings of 2010 IEEE International Symposium on Information Theory. Piscataway:IEEE Press, 2010: 2682-2685.
|
[14] |
LEANDER G , MAY A . Grover meets Simon-quantumly attacking the FX-construction[C]// Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. Berlin:Springer, 2017: 161-178.
|
[15] |
DONG X Y , WANG X Y . Quantum key-recovery attack on Feistel structures[J]. Science China Information Sciences, 2018,61(10): 1-7.
|
[16] |
DONG X Y , LI Z , WANG X Y . Quantum cryptanalysis on some generalized Feistel schemes[J]. Science China Information Sciences, 2019,62(2): 1-12.
|
[17] |
DONG X Y , DONG B Y , WANG X Y . Quantum attacks on some Feistel block ciphers[J]. Designs,Codes and Cryptography, 2020,88(6): 1179-1203.
|
[18] |
倪博煜, 董晓阳 . 改进的 Type-1 型广义 Feistel 结构的量子攻击及其在分组密码 CAST-256 上的应用[J]. 电子与信息学报, 2020,42(2): 295-306.
|
|
NI B Y , DONG X Y . Improved quantum attack on type-1 generalized feistel schemes and its application to CAST-256[J. Journal of Electronics & Information Technology, 2020,42(2): 295-306.
|
[19] |
尤启迪, 钱新, 周旋 ,等. SMS4-like 结构以及 NBC 算法的量子算法攻击研究[J]. 密码学报, 2020,7(6): 864-874.
|
|
YOU Q D , QIAN X , ZHOU X ,et al. Research on quantum cryptanalysis on SMS4-like structure and NBC algorithm[J. Journal of Cryptologic Research, 2020,7(6): 864-874.
|
[20] |
于博, 孙兵, 刘国强 ,等. 若干广义非平衡 Feistel 结构的量子分析研究[J]. 密码学报, 2021,8(6): 960-973.
|
|
YU B , SUN B , LIU G Q ,et al. Quantum cryptanalysis on some generalized unbalanced feistel networks[J. Journal of Cryptologic Research, 2021,8(6): 960-973.
|
[21] |
钱新, 尤启迪, 周旋 ,等. MARS-like Feistel结构的量子攻击[J]. 密码学报, 2021,8(3): 417-431.
|
|
QIAN X , YOU Q D , ZHOU X ,et al. Quantum attack on MARS-like feistel schemes[J. Journal of Cryptologic Research, 2021,8(3): 417-431.
|
[22] |
李艳俊, 林昊, 易子晗 ,等. MIBS 算法量子密码分析[J]. 密码学报, 2021,8(6): 989-998.
|
|
LI Y J , LIN H , YI Z H ,et al. Quantum cryptanalysis of MIBS[J. Journal of Cryptologic Research, 2021,8(6): 989-998.
|
[23] |
LI Y J , LIN H , LIANG M ,et al. A new quantum cryptanalysis method on block cipher Camellia[J]. IET Information Security, 2021,15(6): 487-495.
|
[24] |
李艳俊, 易子晗, 汪振 ,等. 轻量级密码 TWINE-128 的量子密码分析[J]. 密码学报, 2022,9(4): 633-643.
|
|
LI Y J , YI Z H , WANG Z ,et al. Quantum cryptanalysis of lightweight cipher TWINE-128[J. Journal of Cryptologic Research, 2022,9(4): 633-643.
|