参考文献
[1]Beaulieu R,Shors D,Smith J,et al.The SIMON and SPECK Families of Lightweight Block Ciphers[C]//Proceedings of the 52nd ACM/EDAC/IEEE Design Automation Conference.Washington D.C.,USA:IEEE Press,2015:1-6.
[2]Kumar M,Pal S K,Panigrahi A.FeW:A Lightweight Block Cipher[EB/OL].(2015-10-08).http://www.db/journals/iacr/iacr2014.html.
[3]Wheeler D J,Needham R M.TEA,A Tiny Encryption Algorithm[C]//Proceedings of International Workshop on Fast Software Encryption.Berlin,Germany:Springer,1994:363-366.
[4]Hong D,Sung J,Hong S,et al.HIGHT:A New Block Cipher Suitable for Low-resource Device[C]//Pro-ceedings of International Workshop on Cryptographic Hardware and Embedded Systems.Berlin,Germany:Springer,2006:46-59.
[5]Zhang Wentao,Bao Zhenzhen,Lin Dongdai,et al.RECTANGLE:A Bit-slice Lightweight Block Cipher Suitable for Multiple Platforms[J].Sciece China Information Sciences,2015,58(12):1-15.
[6]Wu Wenling,Zhang Lei.LBlock:A Lightweight Block Cipher[M]//Javier L,Gene T.Applied Cryptography and Network Security.Berlin,Germany:Springer,2011:327-344.
[7]Itai D.Improved Differential Cryptanalysis of Round-reduced Speck[M].Berlin,Germany:Springer,2014,8781:147-164.
[8]Abed F,List E,Lucks S,et al.Differential Cryptanalysis of Round-reduced Simon and Speck[C]//Proceedings of International Workshop on Fast Software Encryption.Berlin,Germany:Springer,2014:525-545.
[9]Tupsamudre H,Bisht S,Mukhopadhyay D.Differential Fault Analysis on the Families of SIMON and SPECK Ciphers[C]//Proceedings of Workshop on Fault Diag-nosis & Tolerance in Cryptography.Washington D.C.,USA:IEEE Press,2014:40-48.
[10]Biryukov A,Roy A,Velichkov V.Differential Analysis of Block Ciphes SIMON and SPECK[C]//Proceedings of FSE’14.Berlin,Germany:Springer,2014:546-570.
[11]Dinur I,Shamir A.Cube Attacks on Tweakable Black Box Polynomials[C]//Proceedings of International Con-ference on Advances in Cryptology:The Theory & App-lications of Cryptographic Techniques.Washington D.C.,USA:IEEE Press,2009:278-299.
[12]Aumasson J,Dinur I,Meier W,et al.Cube Tester and Key Recovery Attacks on Reduced-round MD6 and Trivium[C]//Proceedings of FSE’09.Berlin,Germany:Springer,2009:1-22.
[13]Mroczkowski P,Szmidt J.The Cube Attack on Stream Cipher Trivium and Quadraticity Tests[C]//Proceed-ings of the 10th Central European Conference on Cryptology.Berlin,Germany:Springer,2010:309-318.
[14]Sun Siwei,Hu Lei,Xie Yonghong,et al.Cube Cryptanalysis of Hitag2 Stream Cipher[C]//Proceed-ings of International Conference on Cryptology & Network Security.Berlin,Germany:Springer,2011:15-25.
[15]宋海欣,范修斌,武传坤,等.流密码算法Grain的立方攻击[J].软件学报,2012,23(1):171-176.
[16]Islam S,Afzal M,Rashdi A.On the Security of LBlock Against the Cube Attack and Side Channel Cube Attack[M]//Cuzzocrea A,Kittl C,Simos D E,et al.Security Engineering and Intelligence Informatics.Berlin,Germany:Springer,2013:105-121.
编辑陆燕菲 |