[1] BANIK S,BOGDANOV A,ISOBE T,et al.Midori:a block cipher for low energy[M].Berlin,Germany:Springer,2014. [2] REN Yaoyao,ZHANG Wenying.Related-key differential analysis of Midori64[J].Application Research of Computers,2018,35(6):1800-1802.(in Chinese)任瑶瑶,张文英.Midori64的相关密钥不可能差分分析[J].计算机应用研究,2018,35(6):1800-1802. [3] LIN Li,WU Wenling.Meet-in-the-middle attacks on reduced-round Midori64[EB/OL].[2020-02-05].https://eprint.iacr.org/2015/1165.pdf. [4] YU Zheng,MAO Ming,LI Yanjun.Impossible differential analysis of 11-round Midori64 based on method of step-key-guessing[J].Application Research of Computers,2018,35(9):2777-2780.(in Chinese)于政,毛明,李艳俊.基于轮密钥分步猜测方法的Midori64算法11轮不可能差分分析[J].计算机应用研究,2018,35(9):2777-2780. [5] LI Mingming,GUO Jiansheng,CUI Jingyi,et al.Truncated impossible differential cryptanalysis of Midori-64[J].Journal of Software,2019,30(8):2337-2348.(in Chinese)李明明,郭建胜,崔竞一,等.Midori-64算法的截断不可能差分分析[J].软件学报,2019,30(8):2337-2348. [6] CHENG Lu,WEI Yuechuan,LI Anhui,et al.Multi-dimensional zero-correlation linear cryptanalysis on Midori[J].Journal of Shandong University (Natural Science),2018,53(2):88-94.(in Chinese)程璐,魏悦川,李安辉,等.Midori算法的多维零相关线性分析[J].山东大学学报(自然科学版),2018,53(2):88-94. [7] LIAN Chuang.Integral cryptanalysis of lightweight block ciphers[D].Xi'an:Xidian University,2018.(in Chinese)连闯.轻量级分组密码的积分分析[D].西安:西安电子科技大学,2018. [8] GUO J,JEAN J,NIKOLIC I,et al.Invariant subspace attack against Midori64 and the resistance criteria for S-box designs[J].IACR Transactions on Symmetric Cryptology,2016,1:33-56. [9] TODO Y,LEANDER G,SASAKI Y.Nonlinear invariant attack:practical attack on full SCREAM,iSCREAM,and Midori64[J].Journal of Cryptology,2019,32(4):1383-1422. [10] BOGDANOV A,LEANDER G,NYBERG K,et al.Integral and multidimensional linear distinguishers with correlation zero[C]//Proceedings of ASIACRYPT'12.Berlin,Germany:Springer,2012:244-261. [11] WEN L,WANG M.Integral zero-correlation distinguisher for ARX block cipher,with application to SHACAL-2[C]//Proceedings of Australasian Conference on Information Security and Privacy.Berlin,Germany:Springer,2014:454-461. [12] CHEN Huaifeng.Study on several cryptanalysis models on block ciphers[D].Jinan:Shandong University,2017.(in Chinese)陈怀凤.分组密码算法几种分析模型的研究[D].济南:山东大学,2017. [13] BING S,LIU Z,RIJMEN V,et al.Links among impossible differential,integral and zero correlation linear cryptanalysis[C]//Proceedings of CRYPTO'15.Berlin,Germany:Springer,2015:95-115. [14] TODO Y,MORⅡ M.Bit-based division property and application to simon family[C]//Proceedings of International Conference on Fast Software Encryption.Berlin,Germany:Springer,2016:125-136. [15] ZHANG W,RIJMEN V.Division cryptanalysis of block ciphers with a binary diffusion layer[J].IET Information Security,2018,13(2):87-95. [16] BOGDANOV A,RIJMEN V.Linear hulls with correlation zero and linear cryptanalysis of block ciphers[J].Designs Codes & Cryptography,2014,70(3):369-383. [17] WANG Meiqin,WEN Long.Research on zero-correlation linear cryptanalysis[J].Journal of Cryptologic Research,2014,1(3):296-310.(in Chinese)王美琴,温隆.零相关线性分析研究[J].密码学报,2014,1(3):296-310. [18] SUN Ling,CHEN Huaifeng,WANG Meiqin.Zero-correlation attacks:statistical models independent of the number of approximations[J].Designs,Codes and Cryptography,2018,86(9):1923-1945. [19] ISOBE T,SHIBUTANI K.Generic key recovery attack on feistel scheme[C]//Proceedings of International Cryptology Conference.Washington D.C.,USA:IEEE Press,2013:464-485. [20] COLLARD B,STANDAERT F,QUISQUATER J.Improving the time complexity of Matsui's linear cryptanalysis[C]//Proceedings of ICISC'07.Berlin,Germany:Springer,2007:77-88. [21] TODO Y,AOKI K.FFT key recovery for integral attack[C]//Proceedings of International Conference on Cryptology and Network Security.Berlin,Germany:Springer,2014:64-81. [22] CHEN Zhan,WANG Xiaoyun.Impossible differential cryptanalysis of Midori[C]//Proceedings of International Conference on Mechatronics and Automation Engineering.Washington D.C.,USA:IEEE Press,2016:535-543. |