Computer Science ›› 2020, Vol. 47 ›› Issue (11A): 368-372.doi: 10.11896/jsjkx.191200036
• Information Security • Previous Articles Next Articles
HAN Yu, ZHANG Wen-zheng, DONG Xin-feng
CLC Number:
[1] RIJMEN V,PRENEEL B.A family of trapdoor ciphers[M]//Fast Software Encryption.Springer-Verlag,1997:139-148. [2] WU H J,BAO F,DENG R H,et al.Cryptanalysisof rijmen-preneel trapdoor ciphers[C]//Advances in Cryptology-Asiacrypt'98.Springer,1998:126-132. [3] BANNIER A,BODIN N,FILIOL E.Partition-based trapdoor ciphers[OL].http://dx.doi.org/10.5772/intechopen.70420. [4] BANNIER A,FILIOL E.Mathematical backdoors in symmetric encryption systems:Proposal for a backdoored AES-like block cipher[C]//International Workshop on FORmal Methods in Security Engineering (ForSE).2017:622-631. [5] 聂灵沼,丁石孙.代数学引论[M].北京:高等教育出版社,2003. [6] DAEMEN J,RIJMEN V.The design of Rijndael[M].Heidelberg:Springer,2002. [7] BUDAGHYAN L,HELLESETH T.On isotopisms of commuta-tive presemifields and CCZ-equivalence of functions.Int.[J].Found.Comput.Sci.,2011,22:1243-1258. [8] CHEN X,QU L J,LI C,et al.A New Method to Investigate the CCZ- Equivalence between Functions with Low Differential Uniformity[J].Finite Fields and Their Applications,2016,42:165-186. [9] YOSHIARA S.Equivalences of power APN functions with po-wer or quadratic APN functions[J].Journal of Algebraic Combinatorics,2016,44(3):561-585. [10] QU T J,CHEN X,NIU T L,et al.Recent Progress in Low Differential Uniformity Functions over Finite Fields[J].Journal of Computer Research and Development,2018,55(9):1931-1945. [11] CANTEAUT A,DUVAL S,PERRIN L.A generalisation ofDillon's APN permutation with the best knowndifferential and nonlinear properties for all fields of size 24k+2[J].IEEE Tran-sactions on Information Theory,2017,63(11):7575-7591. [12] WANG X C,CHEN K F,SHEN Z H,et al.Construction of a Family of Balanced Boolean Functions with Optimal Algebraic Immunity[J].Computer Applications and Software,2018,35(1):325-329. [13] SUN L,FU F W.Constructions of even-variable RSBFs withoptimal algebraic immunity and high nonlinearity[J].Journal of Applied Mathematics & Computing,2018,56:593-610. [14] ZHANG F R,PASALIC E,WEI Y Z.Constructing bent functions outside the Maiorana-McFarland class using a general form of rothaus[J].IEEE Transactions on Information Theory,2017,63(8):5336-5349. [15] ZHANG W G,PASALIC E.Generalized Maiorana-McFarlandConstruction of Resilient Boolean Functions with High Nonli-nearity and Good Algebraic Properties[J].IEEE Transactions on Information Theory,2014,60(10):6681-6695. [16] FILIOL E.BSEA-1-A Stream Cipher Backdooring Technique[J].arXiv:1903.11063,2019. [17] CHEN S Z,ZHANG Y F,REN J J.Constructions of Maximal Distance Separable Matrices with Minimum XOR-counts[J].Journal of Electronics and Information Technology,2019,41(10):2416-2422. [18] JEAN J,PEYRIN T,SIM S M,et al.Optimizingimplementations of lightweight building blocks[J].IACRTransactions on Symmetric Cryptology,2017,2017(4):130-168. |
[1] | GAO Xiao-dong,YANG Ya-tao and LI Zi-chen. Differential Transition Probability Analysis of SHA-3Permutation Function [J]. Computer Science, 2014, 41(3): 159-162. |
|