Computer Science ›› 2018, Vol. 45 ›› Issue (4): 152-156.doi: 10.11896/j.issn.1002-137X.2018.04.025
Previous Articles Next Articles
ZHENG Xiu-lin, SONG Hai-yan and FU Yi-peng
[1] CAESAR-Competition for Authenticated Encryption:Security,Applicability,and Robustness.http://competitions.cr.yp.to/caesar.html. [2] DAEMEN J,RIJMEN V.AES and the wide trail design strategy[J].Lecture Notes in Computer Science,2002,2260:108-109. [3] BERTONI G,DAEMEN J,PEETERS M,et al.Keccak[M]∥Advances in Cryptology-EUROCRYPT 2013.2013:313-314. [4] WU H J,HUANG T.The Authenticated Cipher MORUS[EB/OL].http://competitions.cr.yp.to/caesar-submissions.html. [5] DWIVEDI A D,KLOUCEK M,MORAW-IECKI P,et al.SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition[C]∥International Conference on Security & Cryptography.2017. [6] ZHANG P,GUAN J,LI J Z,et al.Research on the Confusion and Diffusion Properties of the Initialization of MORUS[J].Journal of Cryptologic Research,2015,2(6):536-548.(in Chinese) 张沛,关杰,李俊志,等.MORUS 算法初始化过程的混乱与扩散性质研究[J].密码学报,2015,2(6):536-548. [7] SHI T,GUAN J,LI J,et al.Improved Collision Cryptanalysis of Authenticated Cipher MORUS[C]∥ International Conference on Artificial Intelligence & Industrial Engineering.2016. [8] COPPERSMITH D,HALEVI S,JUTLA C.Cryptanalysis ofStream Ciphers with Linear Masking[C]∥Advances in Crypto-logy-CRYPTO 2002.Springer Heidelberg,2002:515-532. [9] CHANG Y Q,JIN C H.Linear Distinguishing Attack on Shannon Algorithm[J].Journal of Electronics & Information Technology,2011,33(1):190-193.(in Chinese) 常亚勤,金晨辉.对 Shannon 算法的线性区分攻击[J].电子与信息学报,2011,33(1):190-193. [10] MAITRA S,PAUL G,GUPTA S S.Attack on broadcast RC4 revisited[M]∥Fast Software Encryption.Springer Berlin Heidelberg,2011:199-217. [11] WATANABE D,BIRYUKOV A,CANNIERE C D.A Distinguishing Attack of SNOW 2.0 with Linear Masking Method [C]∥Selected Areas in Cryptography,International Workshop(SAC 2003).Ottawa,Canada,DBLP.2003:222-233. [12] MILEVA A,DIMITROVA V,VELICHKO V V.Analysis of the Authenticated Cipher MORUS(v1)[M]∥Cryptography and Information Security in the Balkans.Springer International Publishing,2015. |
No related articles found! |
|