Computer Science ›› 2015, Vol. 42 ›› Issue (Z11): 352-356.
Previous Articles Next Articles
LI Jia-yu, SHI Hui, DENG Yuan-qing, GONG Jing and GUAN Yu
[1] 刘依依.eSTREAM和流密码分析现状[J].信息安全与通信保密,2009,1(12):47-49 [2] Alex B.A new 128 bit key stream cipher LEX[EB/OL].[2005-06-13].http://www.ecrypt.eu.org/stream/ciphers/lex/lex.pdf [3] National Institute of Standards and Technology(NIST).Announcing the Advanced Encryption Standard(AES) [EB/OL].(2001-11-26).http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf [4] 邓元庆,龚晶,石会.密码学简明教程[M].北京:清华大学出版社,2011:71-93 [5] Henricksen M.Flexible Block Ciphers:Modifying LEX[C]∥Proceedings of ICCSIT2010.Chengdu,2010 [6] Boneh D,DeMillo R A,Lipton R J.On the importance of checking cryptographic protocols for faults[M]∥Advances in Cryptology-EUROCRYPT’97.1997:37-51 [7] Biham E,Shamir A.Differential fault analysis of secret keycryptosystems[M]∥Advances in Crytpology-CRYPTO’97.1997:37-51 [8] Huang J,Susilo W,Seberry J.Differential fault analysis of LEX[C]∥ Proceedings of SCN 2010.Amalfi,Italy,2010 [9] Skorobogatov S,Anderson R.Optical fault induction attacks[M]∥Cryptographic Hardware and Embedded System-CHES 2002.2003:2-12 [10] Giraud C.DFA on AES[M]∥ Advanced Encryption Stardard-AES.2005:27-41 [11] 张中亚,关杰.对流密码算法LEX的差分故障攻击[J].上海交通大学学报,2012,0(6):865-869 [12] 王秋燕,金晨辉.LEX算法的输出位置分析[J].计算机应用与软件,2014,1(10):309-313 [13] 随机性检测规范:GM/T 0005-2012[S].北京:中国标准出版社,2012 |
No related articles found! |
|