[1] |
SPILLMAN R , JANSSEN M , NELSON B ,et al. Use of a genetic algorithm in the cryptanalysis of simple substitution ciphers[J]. Cryptologia, 1993,17(1): 31-44.
|
[2] |
RAMZAN Z . On Using Neural Networks to Break Cryptosystems[R]. Laboratory of Computer Science,Massachusetts Institute of Technology,Cambridge,MA 02139, 1998.
|
[3] |
DILEEP A D , SEKHAR C C . Identification of block ciphers using support vector machines[A]. Proceeding of the 2006 International Joint Conference on Neural Networks[C]. Vancouver,Canada, 2006. 2696-2701.
|
[4] |
MELTEM S T,?A?DA? ? , NURDAN B S , et al . New distinguishers based on random mappings against stream ciphers[A]. Proceeding of the 5th International Conference Lexington[C]. KY,USA, 2008. 30-41.
|
[5] |
陈华, 冯登国, 范丽敏 . 一种关于分组密码的新的统计检测方法[J]. 计算机学报, 2009,32(4): 595-601. CHEN H , FENG D G , FAN L M . A new statistical test on block ciphers[J]. Chinese Journal of Computers, 2009,32(4): 595-601.
|
[6] |
LIU T M , JIANG L H , HE H Q ,et al. Researching on cryptographic algorithm recognition based on static characteristic-code[A]. Proceeding of the Future Generation Information Technology Conference[C]. Jeju Island,Korea, 2009. 140-147.
|
[7] |
MANJULA R , ANTITHA R . Identification of encryption algorithm using decision tree[A]. Proceeding of the First International Conference on Computer Science and Information Technology[C]. Bangalore,India, 2011. 237-246.
|
[8] |
GR?BERT F , WILLEMS C , HOLZ T . Automated identification of cryptographic primitives in binary programs[A]. Proceeding of the 14th International Symposium[C]. Menlo Park,CA,USA, 2011. 41-60.
|
[9] |
谷利泽, 郑世慧, 杨义先 . 现代密码学教程[M]. 北京: 北京邮电大学出版社, 2009. GU L Z , ZHENG S H , YANG Y X . Tutorial of the Modern Cryptography[M]. Beijing: Beijing University of Posts and Telecommunications PressPress, 2009.
|
[10] |
RIVAIN M . Differential fault analysis on DES middle rounds[A]. Proceeding of the 11th International Workshop Lausanne[C]. Switzerland, 2009. 457-469.
|
[11] |
SAHA D , MUKHOPADHYAY D , ROY C D . A diagonal fault attack on the advanced encryption standard[EB/OL]. , 2009.
|
[12] |
赵新杰, 王韬, 郭世泽 . 一种针对Camellia的改进差分故障分析[J]. 计算机学报, 2011,34(4): 613-627. ZHAO X J , WANG T , GUO S Z . An improved differential fault analysis on camellia[J]. Chinese Journal of Computers, 2011,34(4): 613-627.
|
[13] |
赵新杰, 王韬, 郑媛媛 . 针对SMS4密码算法的Cache计时攻击[J]. 通信学报, 2010,31(6): 89-98. ZHAO X J , WANG T , ZHENG Y Y . Cache timing attack on SMS4[J]. Journal on Communications, 2010,31(6): 89-98.
|
[14] |
胡磊, 王鹏等 . 应用密码学手册[M]. 北京: 电子工业出版社, 2005. HU L , WANG P , et al . Handbook of Applied Cryptography[M]. Beijing: Publishing House of Electronics IndustryPress, 2005.
|
[15] |
RUKHIN A , SOTO J , NECHVATAL J . A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications[R]. SP 800-22, 2001.
|
[16] |
FILIOL E . A new statistical testing for symmetric ciphers and hash functions[A]. Proceeding of Information and Communications Security:4th International Conference[C]. Singapore, 2002. 342-353.
|
[17] |
胡俭勇, 苏锦海 . 一种随机性实时检测方案[J]. 计算机工程, 2009,35(9): 136-138. HU J Y , SU J H . Scheme for real time test of randomness[J]. Computer Engineering, 2009,35(9): 136-138.
|
[18] |
FIPS PUB 140-2-2001 Security Requirements for Cryptographic Modules[S]. Washington,USA:National Institute of Standards and Technology, 2001.
|
[19] |
Special Publication 800-22 Revision 1a[S]. Washington,USA:National Institute of Standards and Technology, 2010.
|