共 19 条
- [1] SHANNON C E., Communication Theory of Secrecy Systems[J], The Bell System Technical Journal, 28, 4, pp. 656-715, (1949)
- [2] DIFFIE W, HELLMAN M E., Exhaustive Cryptanalysis of the NBS Data Encryption Standard[J], Computer, 10, 6, pp. 74-84, (1977)
- [3] DAEMEN J, RIJMEN V., The Design of Rijndael:AES-the Advanced Encryption Standard, (2002)
- [4] AOKI K, ICHIKAWA T, KANDA M, Et al., Camellia:a 128-Bit Block Cipher Suitable for Multiple Platforms-Design and Analysis, Lecture Notes in Computer Science:2012, pp. 39-56, (2001)
- [5] WU W L, ZHANG W T, FENG D G., Impossible Differential Cryptanalysis of ARIA and Camellia[J], Journal of Computer Science and Technology, 22, 3, pp. 449-456, (2007)
- [6] TAIZO S, KYOJI S, TORU A, Et al., The 128-bit Block Cipher CLEFIA[C], Lecture Notes in Computer Science:4593, pp. 181-195, (2007)
- [7] BOGDANOV A, KNUDSEN L R, LEANDER G, Et al., PRESENT:an Ultra-Lightweight Block Cipher, Lecture Notes in Computer Science:4727, pp. 450-466, (2007)
- [8] JIA P, XU H, QI W F., Research on Cryptographic Properties of Lightweight S-boxes[J], Journal of Cryptologic Research, 2, 6, pp. 497-504, (2015)
- [9] BORGHOFF J, CANTEAUT A, GUNEYSU T, Et al., PRINCE:a Low-latency Block Cipher for Pervasive Computing Applications, Lecture Notes in Computer Science:7658, pp. 208-225, (2012)
- [10] WEI Yuechuan, PAN Xiaozhong, RONG Yisheng, Et al., Impossible Differential Cryptanalysis on the PRINCE, Journal of Xidian University, 44, 1, pp. 119-124, (2017)