Computer Science ›› 2014, Vol. 41 ›› Issue (3): 169-171.
Previous Articles Next Articles
ZHENG Ya-fei and WEI Hong-ru
[1] Lee C,Cha Y.The Block Cipher:SNAKE with Provable Resistance against DC and LC attacks 1997[C]∥Proceedings of 1997Korea-Japan Joint Workshop on Information Security and Cryptology (JWISC’97).1997:3-17 [2] Moriai S,Shimoyama T,Kaneko T.Interpolation attacks of the block cipher:SNAKE 1999[J].Lecture Notes in Computer Science, Fast Software Encryption,1999,1636:275-289 [3] Sun B,Qu L,Li C.Impossible Differential Cryptanalysis ofSNAKE-22009[C]∥ International Conference on IEEE Networks Security,Wireless Communications and Trusted Computing,2009.2009,2:63-66 [4] 张鹏,孙兵,李超.对特殊类型Feistel密码的Square攻击[J].国防科技大学学报,2010,32(4):137-140 [5] 魏悦川,孙兵,李超.对简化轮数的SNAKE(2)算法的中间相遇攻击[J].计算机工程与科学,2012,34(6):28-31 [6] Daemen J,Knudsen L R,Rijmen V.The block cipher SQUARE [J]∥Lecture Notes in Computer Science,Fast Software Encryption,1997,1267:149-165 [7] Lei D,Chao L,Feng K.New observation on Camellia [J].Lecture Notes in Computer Science,Selected Areas in Cryptography,2006,3897:51-64 [8] 唐学海,李超,谢端强.CLEFIA密码的Square攻击[J].电子与信息学报,2009,31(9):2260-2263 [9] 王美一,唐学海,李超,等.3D密码的Square攻击[J].电子与信息学报,2010,32(1):157-161 [10] Zhang P,Sun B,Li C.Saturation attack on the block cipher HIGHT[C]∥Proceeding of the 8th International Conference on Crytology and Network Security.2009:76-86 [11] 张鹏,李瑞林,李超.Zodiac算法新的Square攻击[J].电子与信息学报,2010,32(11):2790-2794 [12] 陈华,吴文玲,冯登国.提高S盒非线性度的有效算法[J].计算机科学,2005,32(10):68-70 |
No related articles found! |
|