Computer Science ›› 2020, Vol. 47 ›› Issue (7): 263-267.doi: 10.11896/jsjkx.200200034
• Information Security • Previous Articles Next Articles
SHEN Xuan, WANG Xin-mei, HE Jun, SUN Zhi-yuan
CLC Number:
[1]DAEMEN J,RIJMEN V.The Design of Rijndael:AES-the Advanced Encryption Standard[M].Berlin:Springer-Verlag,2002:31-148. [2]HONG D,SUNG J,HONG S,et al.HIGHT:a new block cipher suitable for low-resource device[C]//Proceedings of the 2006 International Workshop on Cryptographic Hardware and Embedded Systems.Yokohama,Japan,2006:46-59. [3]BOGDANOV A,KNUDSEN L R,LEANDER G,et al.PRE-SENT:an ultra-lightweight block cipher[C]//Proceedings of the 2007 International Workshop on Cryptographic Hardware and Embedded Systems.Vienna,Austria,2007:450-466. [4]GUO J,PEYRIN T,POSCHMANN A,et al.The LED block cipher[C]//Proceeding of the 2011 International Workshop on Cryptographic Hardware and Embedded Systems.Nara,Japan,2011:326-341. [5]WU W L,ZHANG L.LBlock:a lightweight block cipher[C]//Proceedings of the 9th International Conference on Applied Cryptography and Network Security.Nerja,Spain,2011:327-344. [6]YANG G Q,ZHU B,SUDER V,et al.The Simeck family of lightweight block ciphers[C]// Proceeding of the 2015 International Workshop on Cryptographic Hardware and Embedded Systems.Saint-Malo,France,2015:307-329. [7]BEIERLE C,JEAN J,KÖLBL S,et al.The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS[C]// Proceeding of the 36th Advances in Cryptology-CRYPTO 2016.Santa Barbara,CA,USA,2016:123-153. [8]BANIK S,PANDEY S K,PEYRIN T,et al.GIFT:A SmallPresent[C]//Proceeding of the 2017 International Workshop on Cryptographic Hardware and Embedded Systems.Taipei,Taiwan,2017:321-345. [9]HUANG Y H,DAI X J,SHI Y Y,et al.Ultra-light weightblock cipher algorithm(PFP) based on Feistel structure[J].Computer Science,2017,44(3):163-168. [10]KNUDSEN L R.Truncated and Higher Order Differentials[C]//Proceeding of the Fast Software Encryption-FSE 1994.Leuven:Springer-Verlag,1995:196-211. [11]BLONDEAU C,GERARD B.Multiple Differential Cryptanaly-sis:Theory and Practice [C]//Proceeding of the Fast Software Encryption-FSE 2011.Lyngby:Springer-Verlag,2011:35-54. [12]BIHAM E,BIRYUKOV A,SHAMIR A.Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials [C]//Proceeding of the Advances in Cryptology-EUROCRYT 1999.Prague:Springer-Verlag,1999:12-23. [13]BOURA C,LALLEMAND V,PLASENCIA M N,et al.Making the impossible possible[J].Journal of Cryptology,2018,31(1):101-133. [14]SHEN X,HE J.Improved Impossible Differential Attack on 7-round Reduced ARIA-256[J].KSII Transactions on Internet and Information Systems,2019,13(11):5773-5784. [15]SASAKI Y,TODO Y.New Impossible Differential Search Tool from Design and Cryptanalysis Aspects[C]//Advances in Cryptology-EUROCRYT 2017.Paris,2017:185-215. [16]WU X N,LI Y X,WEI Y Z,et al.Impossible differential distinguisher analysis of GRANULE and MANTRA algorithm[J].Journal on Communications,2020,41(1):94-101. [17]KNUDSEN L.DEAL-A 128-bit Block Cipher [R].University ofBergen,Norway,1998. |
[1] | WANG Jian, CHEN Hua, KUANG Xiao-yun, YANG Yi-wei, HUANG Kai-tian. Study on Threat of Persistent Fault Attack [J]. Computer Science, 2021, 48(11A): 523-527. |
[2] | ZHU Ren-jie. Study on SM4 Differential Fault Attack Under Extended Fault Injection Range [J]. Computer Science, 2019, 46(11A): 493-495. |
[3] | LI Lang and LIU Bo-tao. Surge:A New Low-resource and Efficient Lightweight Block Cipher [J]. Computer Science, 2018, 45(2): 236-240. |
[4] | LI Lang, ZOU Yi, LI Zhu-hua and LIU Bo-tao. Differential Fault Analysis on DBlock Cipher Algorithm [J]. Computer Science, 2017, 44(7): 116-119. |
[5] | HUANG Yu-hua, DAI Xue-jun, SHI Yang-yang, LIU Ning-zhong, ZENG Qing-xi and SU Fei. Ultra-lightweight Block Cipher Algorithm (PFP) Based on Feistel Structure [J]. Computer Science, 2017, 44(3): 163-167. |
[6] | MA Meng, ZHAO Ya-qun and LIU Qing-cong. Integral Zero-correlation Cryptanalysis on Zodiac [J]. Computer Science, 2017, 44(2): 202-205. |
[7] | DAI Xue-jun, HUANG Yu-hua and LIU Ning-zhong. VHF:A Lightweight Block Cipher Based on Dual Pseudo-random Transformation and Feistel Structure [J]. Computer Science, 2017, 44(2): 192-194. |
[8] | DONG Da-qiang and YIN Xin-chun. New Improved Algorithm Based on REESSE3+ [J]. Computer Science, 2017, 44(12): 120-125. |
[9] | GAO Hong-jie and WEI Hong-ru. Impossible Differential Attack on 12-round Block Cipher ESF [J]. Computer Science, 2017, 44(10): 147-149. |
[10] | CHEN Yu-lei and WEI Hong-ru. Impossible Differential Cryptanalysis of ESF [J]. Computer Science, 2016, 43(8): 89-91. |
[11] | SUN Cui-ling WEI Hong-ru. Research on Impossible Differential Attack of Cipher SMS4 [J]. Computer Science, 2015, 42(7): 191-193. |
[12] | WEN Ya-min, LI Feng-xia, GONG Zheng and TANG Shao-hua. Fast Implementation of KLEIN for Resisting Timing and Cache Side-channel Attacks on AVR [J]. Computer Science, 2015, 42(3): 148-152. |
[13] | QIU Feng-pin and WEI Hong-ru. Impossible Differential Cryptanalysis of CLEFIA-128 [J]. Computer Science, 2015, 42(11): 208-211. |
[14] | YIN Guang-li and WEI Hong-ru. Impossible Differential Cryptanalysis of CLEFIA [J]. Computer Science, 2014, 41(Z6): 352-356. |
[15] | HU Zhi-hua,QIN Zhong-ping and ZHANG Qing. Novel Method for Impossible Differential Cryptanalysis of 9-Round AES_256 [J]. Computer Science, 2014, 41(8): 197-201. |
|