[1] NAKAHARA J J. 3D: a three-dimensional block cipher[M]//FRANKLIN M K, HUI L C K, WONG D S. Cryptology and Network Security,LNCS 5339. Berlin: Springer, 2008:252-267. [2] DAEMEN J, RIJMEN V. Rijndael/AES[M]//van TILBORG H C A. Encyclopedia of Cryptography and Security. Berlin: Springer, 2005:520-524. [3] TANG X, LI C, WANG M, et al. Impossible differential attack on 3D cipher[J]. Journal of Electronics and Information Technology, 2010,32(10):2516-2520.(唐学海,李超,王美一,等.3D密码的不可能差分攻击[J].电子与信息学报,2010,32(10):2516-2520.) [4] WANG M, TANG X, LI C, et al. Square attacks on 3D cipher[J]. Journal of Electronics and Information Technology, 2010,32(1):157-161.(王美一,唐学海,李超,等.3D密码的Square攻击[J].电子与信息学报,2010,32(1):157-161.) [5] DONG L, WU W, WU S, et al. Known-key distinguisher on round-reduced 3D block cipher[M]//JUNG S, YUNG M. Information Security Applications, LNCS 7115. Berlin: Springer, 2012:55-69. [6] SU C, WEI Y, MA C. Meet-in-the-middle attack on 10-round reduced 3D block cipher[J]. Journal of Electronics and Information Technology, 2012,34(3):694-697.(苏崇茂,韦永壮,马春波.10轮3D分组密码算法的中间相遇攻击[J].电子与信息学报,2012,34(3):694-697.) [7] KOYAMA T, WANG L, SASAKI Y, et al. New truncated differential cryptanalysis on 3D block cipher[M]//RYAN M D, SMYTH B, WANG G. Information Security Practice and Experience, LNCS 7232. Berlin: Springer, 2012:109-125. [8] LI M, CHEN S. Improved meet-in-the-middle attack on 10 round 3D cipher[J]. Journal of Information Engineering University, 2013,14(3):257-262.(李曼曼,陈少真.改进的10轮3D密码算法的中间相遇攻击[J].信息工程大学学报,2013,14(3):257-262.) [9] BARRETO P, RIJMEN V. The anubis block cipher[EB/OL].[2014-05-10]. http://www.larc.usp.br/~pbarreto/AnubisPage.html. [10] DIFFIE W, HELLMAN M E. Special feature exhaustive cryptanalysis of the NBS data encryption standard[J]. Computer, 1977,10(6):74-84. [11] DUNKELMAN O, KELLER N, SHAMIR A. Improved single-key attacks on 8-round AES-192 and AES-256[M]//ABE M. Advances in Cryptology-ASIACRYPT 2010, LNCS 6477. Berlin: Springer, 2010:158-176. [12] LU J, DUNKELMAN O, KELLER N, et al. New impossible differential attacks on AES[M]//CHOWDHURY D R, RIJMEN V, DAS A. Progress in Cryptology-INDOCRYPT 2008, LNCS 5365. Berlin: Springer, 2008:279-293. [13] DERBEZ P, FOUQUE P A, JEAN J. Improved key recovery attacks on reduced-round AES in the single-key setting[C]//Proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2013:371-378. |