Computer Science ›› 2019, Vol. 46 ›› Issue (11A): 493-495.
• Information Security • Previous Articles Next Articles
ZHU Ren-jie
CLC Number:
[1]国家密码管理局.国家密码管理局公告(7号)[EB/OL].[2016-11-04].http://www.oscca.gov.cn/News/200709/News_1105.htm. [2]SU B Z,WU W L,ZHANG W T.Security of the SMS4 Block Cipher Against Differential Cryptanalysis[J].Journal of Computer Science & Technology,2011(1):132-140. [3]LIU M J,CHEN J Z.Improved Linear Attacks on the Chinese Block Cipher Standard[J].Journal of Computer Science and Technology,2014:197-207. [4]马猛,赵亚群,刘庆聪,等.SMS4算法的多维零相关线性分析[J].密码学报,2015,2(5):458-466. [5]PIRET G,QUISQUATER J J.A differential fault attack technique against SPN structure,with application to the AES and KHAZAD[C]∥C.D.Walter,ÇK.Koçc,and C.Paar,editors,Cryptographic Hardware and Embedded Systems CHES 2003,volume 2779 of Lecture Notes in Computer Science.Springer Verlag,2003:77-88. [6]TUNSTALL M,MUKHOPADHYAY D.Differential faultanalysis of the Advanced Encryption Standard using a single fault[J].Cryptology ePrint Archive,Report 2009/575,2009. [7]BIHAM E,SHAMIR A.Differential Fault Analysis of SecretKey Cryptosystems[C]∥Proceedings of the 17th AnnualInternational Cryptology Conference.Berlin,Germany:Springer,1997:513-525. [8]RIVAIN M.Differential fault analysis on DES middle rounds[C]∥International Workshop on Cryptograhic Hardware and Embedded Systems.Berlin:Springer,2009:457-469. [9]HEMME L.A differential fault attack against early rounds of (Triple-)DES.[C]∥International Workshop on Cryptograhic Hardware and Embedded Systems.Berlin:Springer,2004:254-267. [10]MATSUI M.On correlation between the order of S-boxes and the strength of DES[C]∥DeSantis,A.(ed.) Advances in Cryptology—EUROCRYPT ’94,Lecture Notes in ComputerScience.Berlin:Springer,1995:366-375. [11]张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006(9):86-92. [12]荣雪芳,吴震,王敏,等.基于随机故障注入的SM4差分故障攻击方法[J].计算机工程,2016,42(7):129-133. [13]王敏,吴震,饶金涛,等.针对SM4算法的约减轮故障攻击[J].通信学报,2016,37(S1):98-103. [14]李玮.若干分组密码算法的故障攻击研究[D].上海:上海交通大学,2009. [15]陶智.若干对称密码算法的安全性分析[D].上海:东华大学,2015. [16]ABHISHEK C,BODHISATWA M,DEBDEEP M.Combinedside-channel and fault analysis attack on protected grain family of stream ciphers[OL].http://eprint.iacr.org/2015/602.pdf,2015. [17]REN Y,WANG A,WU L.Transient-steady effect attack onblock ciphers[C]∥Cryptographic Hardware and Embedded Systems(CHES).Saint Malo,France,2015:433-450. [18]SIKHAR P,ABHISHEK C,DEBDEEP M.Fault tolerant infective countermeasure for AES[J].Security,Privacy and Applied Cryptography Engineering,2015,935(4):190-209. |
[1] | LU Chen-yang, DENG Su, MA Wu-bin, WU Ya-hui, ZHOU Hao-hao. Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients [J]. Computer Science, 2022, 49(9): 183-193. |
[2] | SHAO Zi-hao, YANG Shi-yu, MA Guo-jie. Foundation of Indoor Information Services:A Survey of Low-cost Localization Techniques [J]. Computer Science, 2022, 49(9): 228-235. |
[3] | ZHANG Yuan, KANG Le, GONG Zhao-hui, ZHANG Zhi-hong. Related Transaction Behavior Detection in Futures Market Based on Bi-LSTM [J]. Computer Science, 2022, 49(7): 31-39. |
[4] | SUN Gang, WU Jiang-jiang, CHEN Hao, LI Jun, XU Shi-yuan. Hidden Preference-based Multi-objective Evolutionary Algorithm Based on Chebyshev Distance [J]. Computer Science, 2022, 49(6): 297-304. |
[5] | WANG Yong, CUI Yuan. Cutting Edge Method for Traveling Salesman Problem Based on the Shortest Paths in Optimal Cycles of Quadrilaterals [J]. Computer Science, 2022, 49(6A): 199-205. |
[6] | LI Dan-dan, WU Yu-xiang, ZHU Cong-cong, LI Zhong-kang. Improved Sparrow Search Algorithm Based on A Variety of Improved Strategies [J]. Computer Science, 2022, 49(6A): 217-222. |
[7] | LU Chen-yang, DENG Su, MA Wu-bin, WU Ya-hui, ZHOU Hao-hao. Clustered Federated Learning Methods Based on DBSCAN Clustering [J]. Computer Science, 2022, 49(6A): 232-237. |
[8] | HU Cong, HE Xiao-hui, SHAO Fa-ming, ZHANG Yan-wu, LU Guan-lin, WANG Jin-kang. Traffic Sign Detection Based on MSERs and SVM [J]. Computer Science, 2022, 49(6A): 325-330. |
[9] | YANG Jian-nan, ZHANG Fan. Classification Method for Small Crops Combining Dual Attention Mechanisms and Hierarchical Network Structure [J]. Computer Science, 2022, 49(6A): 353-357. |
[10] | ZHANG Jia-hao, LIU Feng, QI Jia-yin. Lightweight Micro-expression Recognition Architecture Based on Bottleneck Transformer [J]. Computer Science, 2022, 49(6A): 370-377. |
[11] | WANG Fang-hong, FAN Xing-gang, YANG Jing-jing, ZHOU Jie, WANG De-en. Strong Barrier Construction Algorithm Based on Adjustment of Directional Sensing Area [J]. Computer Science, 2022, 49(6A): 612-618. |
[12] | TIAN Zhen-zhen, JIANG Wei, ZHENG Bing-xu, MENG Li-min. Load Balancing Optimization Scheduling Algorithm Based on Server Cluster [J]. Computer Science, 2022, 49(6A): 639-644. |
[13] | LIU Jian-mei, WANG Hong, MA Zhi. Optimization for Shor's Integer Factorization Algorithm Circuit [J]. Computer Science, 2022, 49(6A): 649-653. |
[14] | CHEN Bo-chen, TANG Wen-bing, HUANG Hong-yun, DING Zuo-hua. Pop-up Obstacles Avoidance for UAV Formation Based on Improved Artificial Potential Field [J]. Computer Science, 2022, 49(6A): 686-693. |
[15] | ZHANG Zhi-long, SHI Xian-jun, QIN Yu-feng. Diagnosis Strategy Optimization Method Based on Improved Quasi Depth Algorithm [J]. Computer Science, 2022, 49(6A): 729-732. |
|