Computer Science ›› 2017, Vol. 44 ›› Issue (8): 146-150.doi: 10.11896/j.issn.1002-137X.2017.08.026
Previous Articles Next Articles
DING Jie, SHI Hui, GONG Jing and DENG Yuan-qing
[1] 邓元庆,龚晶,石会.密码学简明教程[M].北京:清华大学出版社,2011:71-105. [2] European Union.European Project IST-1999-12324:New European Schemes for Signatures,Integrity,and Encryption[EB/OL].[2002-03-16].http://www.cosic.esat.kuleuven.be/nessie. [3] Randomness Test Specification:GM/T0005-2012[S].Beijing:Standards Press of China,2012.(in Chinese) 随机性检测检测规范:GM/T0005-2012[S].北京:中国标准出版社,2012 [4] BIRYUKOV A.A new 128 bit Key Stream Cipher LEX [EB/OL].[2005-06-13].http://www.ecrypt.eu.org /stre-am/chip-hers /lex/lex.pdf. [5] LI J Y,SHI H,DENG Y Q,et al.Improvement and Analysis on Slide Attack-Resistant Stream Cipher LEX[J].Communications Technology,2015,8(2):203-207.(in Chinese) 李佳雨,石会,邓元庆,等.抗滑动攻击的LEX算法改进及分析[J].通信技术,2015,8(2):203-207. [6] LI J Y,SHI H,DENG Y Q,et al.Differential Fault Attack and Analysis of Improvement on LEX[J].Computer Science,2015,2(11A):352-356.(in Chinese) 李佳雨,石会,邓元庆,等.针对流密码LEX的差分故障攻击及算法改进分析[J].计算机科学,2015,2(11A):352-356. [7] WU H J,PRENEEL B.Attacking the IV Setup of Stream Cipher LEX[EB/OL].[2006-03-15].http://www.ecrypt.eu.org/stream/papersdir/059.pdf. |
No related articles found! |
|