[1] GUO J,PEYRIN T,POSCHMANN A,et al.The LED block cipher[C]//Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems.Berlin,Germany:Springer,2011:326-341. [2] WU Weiling,ZHANG Lei.LBlock:a lightweight block cipher[C]//Proceedings of International Conference on Applied Cryptography and Network Security.Berlin,Germany:Springer,2011:327-344. [3] KNUDSEN L R,LEANDER G.PRESENT-block cipher[C]//Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems.Berlin,Germany:Springer,2011:39-59. [4] HONG D,SUNG J,HONG S,et al.HIGHT:a new block cipher suitable for low-resource device[C]//Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems.Berlin,Germany:Springer,2006:46-59. [5] BEAULIEU R,SHORS D,SMITH J,et al.The SIMON and SPECK lightweight block ciphers[C]//Proceedings of the 52nd Annual Design Automation Conference.New York,USA:ACM Press,2015:1-6. [6] PATIL J,BANSOD G,KANT K S.LiCi:a new ultra-lightweight block cipher[C]//Proceedings of 2017 International Conference on Emerging Trends & Innovation in ICT.Washington D.C.,USA:IEEE Press,2017:40-45. [7] WEI Yongzhuang,SHI Jiali,LI Lingchen.Impossible differential cryptanalysis of LiCi block cipher[J].Journal of Electronics & Information Technology,2019,41(7):1610-1617.(in Chinese)韦永壮,史佳利,李灵琛.LiCi分组密码算法的不可能差分分析[J].电子与信息学报,2019,41(7):1610-1617. [8] KNUDSEN L,WAGNER D.Integral cryptanalysis[C]//Proceedings of Fast Software Encryption.Berlin,Germany:Springer,2002:112-127. [9] BIHAM E,SHAMIR A.Differential cryptanalysis of DES-like cryptosystems[J].Journal of Cryptology,1991,4(1):3-72. [10] MATSUI M.Linear cryptanalysis method for DES cipher[C]//Proceedings of EUROCRYPT'93.Berlin,Germany:Springer,1993:386-397. [11] COURTOIS N T,MEIER W.Algebraic attacks on stream ciphers with linear feedback[C]//Proceedings of Lecture Notes in Computer Science.Berlin,Germany:Springer,2003:345-359. [12] ZHAO Xinjie,WANG Tao,GUO Shize.An improved differential fault analysis on Camellia[J].Chinese Journal of Computers,2011,34(4):613-627.(in Chinese)赵新杰,王韬,郭世泽.一种针对Camellia的改进差分故障分析[J].计算机学报,2011,34(4):613-627. [13] HUANG Changyang,WANG Tao,WANG Xiaohan,et al.Algebraic fault attack against SIMECK cipher based on optimized fault location[J].Computer Engineering,2019,45(8):7-13,21.(in Chinese)黄长阳,王韬,王晓晗,等.基于优化故障定位的SIMECK密码代数故障攻击[J].计算机工程,2019,45(8):7-13,21. [14] SHEN Yu,LI Wei,GU Dawu,et al.Integral fault analysis of the ARIA cipher[J].Journal on Communications,2019,40(2):164-173.(in Chinese)沈煜,李玮,谷大武,等.ARIA密码的积分故障分析[J].通信学报,2019,40(2):164-173. [15] DAEMEN J,RIJMEN V.The design of rijndael[M].New York,USA:ACM Press,2002:634-639. [16] AOKI K,ICHIKAWA T,KANDA M,et al.Camellia:a 128-bit block cipher suitable for multiple platforms-design and analysis[C]//Proceedings of International Conference on Selected Areas in Cryptography.Berlin,Germany:Springer,2001:39-56. [17] JUNOD P,VAUDENAY S.FOX:a new family of block ciphers[C]//Proceedings of International Workshop on Selected Areas in Cryptography.Berlin,Germany:Springer,2004:114-129. [18] BORGHOFF J L,CANTEAUT A N,GÜNEYSU T,et al.PRINCE-A low-latency block cipher for pervasive computing applications[C]//Proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security.Berlin,Germany:Springer,2012:208-225. [19] TODO Y.Structural evaluation by generalized integral property[C]//Proceedings of EUROCRYPT'15.Berlin,Germany:Springer,2015:287-314. [20] TODO Y.Integral cryptanalysis on full MISTY1[J].Journal of Cryptology,2015,30:920-959. [21] XIANG Zejun,ZHANG Wentao,BAO Zhenzhen,et al.Applying MILP method to searching integral distinguishers based on division property for 6 lightweight block ciphers[C]//Proceedings of ASIACRYPT'16.Berlin,Germany:Springer,2016:648-678. [22] YANG G Q,ZHU B,SUDER V,et al.The simeck family of lightweight block ciphers[C]//Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems.Berlin,Germany:Springer,2015:307-329. [23] CHEN Qin,CHEN Wei,ZHOU Lv.An algorithm of calculating boolean function formers[J].Computer Engineering and Application,2002,38(8):87-88.(in Chinese)陈勤,陈伟,周律.布尔函数表达式的求解算法[J].计算机工程与应用,2002,38(8):87-88. [24] TODO Y,MORⅡ M.Bit-based division property and application to simon family[C]//Proceedings of the 23rd International Conference on Fast Software Encryption.Berlin,Germany:Springer,2016:357-377. [25] FERGUSON N,KELSEY J,LUCKS S,et al.Improved cryptanalysis of rijndael[C]//Proceedings of International Workshop on Fast Software Encryption.Berlin,Germany:Springer,2001:213-230. |