参考文献
[1]BIHAM E,SHAMIR A.Differential Cryptanalysis of DES-like Cryptosystems[C]//Proceedings of Advances in Cryptology-CRYPTO’90.Berlin,Germany:Springer-Verlag,1990:2-21.
[2]BIHAM E,SHAMIR A.Differential Cryptanalysis of Snefru,Khafre,REDOC-II,LOKI and Lucifer[C]//Proceedings of Advanced in Cryptology-CRYPTO’91.Berlin,Germany:Springer-Verlag,1991:156-171.
[3]BIHAM E.On Matsui’s Linear Cryptanalysis[C]//Proceedings of Advanced in Cryptology-EUROCRYPT’94.Berlin,Germany:Springer-Verlag,1994:341-355.
[4]MATSUI M.Linear Cryptoanalysis Method for DES Cipher[C]//Proceedings of Cryptology-EUROCRYPT’93.Berlin,Germany:Springer-Verlag,1993:386-397.
[5]MATSUI M.The First Experimental Cryptanalysis of DES[C]//Proceedings of Advanced in Cryptology-CRYPTO’94.Berlin,Germany:Springer-Verlag,1994:1-11.
[6]LEANDER G,POSCHMANN A.On the Classification of 4 Bit S-boxes[C]//Proceedings of WAIFI’07.Berlin,Germany: Springer-Verlag,2007:159-176.
[7]SAARINEN M J O.Cryptographic Analysis of all 4×4-bit Sboxes[C]//Proceedings of SAC’11.Berlin,Germany:Springer-Verlag,2011:118.
[8]HONG S,LEE S,LIM J,et al.Provable Security Against Differential and Linear Cryptanalysis for the SPN Structure[C]//Proceedings of FSE’00.Berlin,Germany:Springer-Verlag,2001:273-283.
[9]PARK S,SUNG S H,LEE S,et al.Improving Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES[C]//Proceedings of FSE’03.Berlin,Germany:Springer-Verlag,2003:247-260.
[10]CANTEAUT A,ROUE J.On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks[C]//Proceedings of Advances in Cryptology-Eurocrypt’15.Berlin,Germany:Springer-Verlag,2015:45-74.
[11]KEON D,KIM J,PARK S,et at.New Block Cipher:ARIA[C]//Proceedings of ICISC’03.Berlin,Germany:Springer-Verlag,2003:432-445.
[12]ANDERSON R,BIHAM E,KNUDSEN L.Serpent:A Proposal for the Advanced Encryption Standard[C]//Proceedings of AES’98.Berlin,Germany:Springer-Verlag,1998:1-23.
[13]DAEMEN J,RIJMEN V.The Design of Rijndael:AES-the Advanced Encryption Standard[M].[S.1.]:Springer Science & Business Media,2013.
[14]屈龙江,付绍静,李超.密码函数安全性指标的研究进展[J].密码学报,2014,1(6):578-588.
[15]李超,屈龙江,周悦.密码函数的安全性指标分析[M].北京:科学出版社,2011.
编辑索书志 |