Computer Science ›› 2015, Vol. 42 ›› Issue (11): 208-211.doi: 10.11896/j.issn.1002-137X.2015.11.043
Previous Articles Next Articles
QIU Feng-pin and WEI Hong-ru
[1] Biham E,Biryukov A,Shamir A.Cryptanalysis of Skipjack re-duced to 31 rounds using impossible differentials[C]∥Advances in Cryptology-Eurocrypt,1999.Springer Berlin Heidelberg,1999:12-23 [2] Shirai T,Shibutani K,Akishita T,et al.The 128-bit Blockcipher CLEFIA(Extended Abstract)[C]∥Proc.of FSE’07.Dubrovnik,Croatia:[s.n.],2007:181-195 [3] Sony Corporation.The 128-bit Blockcipher CLEFIA:Algorithm Specification Revision 1.0.(2007-06-01).http://www.sony.net/products/cryptography/clefia/index.html, [4] Sony Corporation.The 128-bit Blockcipher CLEFIA,Security and Performance Evaluations,Revision1.0[EB/OL].(2007-06-01).http://www.Sony.net/Products/cryptography/cle-fia/ [5] 王薇.分组密码CLEFIA与基于四圈AES的消息认证码的安全性分析[D].济南:山东大学,2009 Wang Wei.Cryptanalysis of Block Cipher CLEFIA and MACs based on four rounds AES[D].Jinan:Shandong University,2009 [6] Wang Wei,Wang Xiao-yun.Improved impossible differentialCryptanalysis of CLEFIA[EB/OL].(2008-05-05).http://eprint.iacr.org/2007/466 [7] Tsunoo Y,Tsujihara E,Shigeri M,et al.Impossible differential Cryptanalysis of CLEFIA [C]∥Proc.of FSE’08.Atlanta,USA:[s.n.],2008:398-411 [8] Zhang Wen-ying,Han Jing.Impossible differential analysis ofreduced round CLEFIA[C]∥Proc.of Inscrypt’08.Beijing,China,2008:181-191 [9] Tang X,Sun B,Li R,et al.Impossible differential cryptanalysis of 13-round CLEFIA-128[J].Journal of Systems and Software,2011,84(7):1191-1196 [10] Mala H,Dakhilalian M,Shakiba M.Impossible differential attacks on 13-round CLEFIA-128[J].Journal of Computer Science and Technology,2011,26(4):744-750 [11] Wu Wen-ling,Zhang Lei,Zhang Wen-tao.Improved impossibledifferential Cryptanalysis of reduced-round Camellia[C]∥Proc.of SAC’08.[S.l.]:ACM Press,2008:442-456 [12] 郑秀林,连至助,鲁艳蓉,等.CLEFIA-128算法的不可能差分密码分析[J].计算机工程,2012,38(3):141-144 Zheng Xiu-lin,Lian Zhi-zhu,Lu Yan-rong,et al.Impossible differential Cryptanalysis of CLEFIA-128 algorithm[J].Computer Engineering,2012,38(3):141-144 |
No related articles found! |
|