参考文献
[1]Ferguson N,Lucks S,Schneier B,et al.The Skein Hash Function Family[EB/OL].(2008-10-29).http://www.schneier.com/skein1.3.pdf.
[2]Aumasson J P,Henzen L,Meier W,et al.SHA-3 Proposal BLAKE[EB/OL]. (2010-10-10).http://csrc.nist.gov/groups/ST/hash/sha-3/index.html.
[3]Berstein D J.The Salsa20/8 and Salsa20/12[EB/OL].(2006-01-16).http://cr.yp.to/snuffle/812.pdf.
[4]Biham E,Seberry J,Gonzalez N.A Fast and Secure Stream Cipher Using Rolling Arrays[EB/OL].(2005-01-29).http://www.uow.edu.au/~jennie/WEB/WEB05/py-submission.pdf.
[5]Lai Xuejia,Massey J L.A Proposal for a New Block Encryption Standard[C]//Proceedings of Workshop on the Theory and Application of Cryptographic Tech-niques.Berlin,Germany:Springer,1990:389-404.
[6]郭建胜,金晨辉.逐位模2加运算与模2n加运算的相容程度分析[J].高校应用数学学报,2003,18(2):247-250.
[7]张龙,吴文玲,温巧燕.Mod2n加运算与F2上异或运算差值的概率分布和递推公式[J].北京邮电大学学报,2007,30(1):85-89.
[8]陈士伟,金晨辉.模2加整体逼近二元和三元模2n加的噪声函数分析[J].电子与信息学报,2008,30(6):1445-1449.
[9]陈士伟,金晨辉,李席斌.模2n加与模2加相对于交换律的相容程度分析及其应用[J].北京邮电大学学报,2010,33(3):44-47.
[10]买应霞,陈士伟,李席斌.异或加整体逼近模2n加差值函数的和概率分布[J].计算机工程,2013,39(4):128-131.
[11]Matsui M.Linear Cryptanalysis Method for DES Cipher[C]//Proceedings of Workshop on the Theory and Application of Cryptographic Techniques.Berlin,Germany:Springer,1993:386-397.
[12]Wallen J.Linear Approximations of Addition Modulo 2n[C]//Proceedings of International Workshop on Fast Software Encryption.Berlin,Germany:Springer,2003:261-273.
[13]Sekar G,Paul S,Preneel B.Distinguishing Attacks on the Stream Cipher Py[C]//Proceedings of the 13th International Conference on Fast Software Encryption.New York,USA:ACM Press,2005:405-421.
[14]Yu Hongbo,Chen Jiazhe,Jia Keting,et al.Near-collision Attack on the Step-reduced Compression Function of Skein-256[M].Berlin,Germany:Springer,2011.
[15]Aumasson J P,Leurent G,Meier W,et al.Tuple Cryptanalysis of ARX with Application to BLAKE and Skein[C]//Proceedings of ECRYPT Workshop on Hash Functions.Berlin,Germany:Springer,2011:1-13.
编辑顾逸斐 |