1 |
WEBSTER A F, TAVARES S E. On the design of S-boxes[C]// Proceedings of the 1985 Conference on the Theory and Application of Cryptographic Techniques, LNCS 218. Berlin: Springer, 1986: 523-534. 10.1007/3-540-39799-x_41
|
2 |
ADAMS C, TAVARES S. The structured design of cryptographically good S-boxes[J]. Journal of Cryptology, 1990, 3(1): 27-41. 10.1007/bf00203967
|
3 |
DETOMBE J, TAVARES S. Constructing large cryptographically strong S-boxes[C]// Proceedings of the 1992 International Workshop on the Theory and Application of Cryptographic Techniques, LNCS 718. Berlin: Springer, 1993: 165-181. 10.1007/3-540-57220-1_60
|
4 |
MILLAN W. How to improve the nonlinearity of bijective S-boxes[C]// Proceedings of the 1998 Australasian Conference on Information Security and Privacy, LNCS 1438. Berlin: Springer, 1998: 181-192.
|
5 |
MATSUI M. New block encryption algorithm MISTY[C]// Proceedings of the 1997 International Workshop on Fast Software Encryption, LNCS 1267. Berlin: Springer, 1997: 54-68.
|
6 |
CARLET C, DALAI D K, GUPTA K C, et al. Algebraic immunity for cryptographically significant Boolean functions: analysis and construction[J]. IEEE Transactions on Information Theory, 2006, 52(7): 3105-3121. 10.1109/tit.2006.876253
|
7 |
STOFFELEN K. Optimizing S-box implementations for several criteria using SAT solvers[C]// Proceedings of the 2016 International Conference on Fast Software Encryption, LNCS 9783. Berlin: Springer, 2016: 140-160.
|
8 |
LU Z, WANG W, HU K, et al. Pushing the limits: searching for implementations with the smallest area for lightweight S-boxes[C]// Proceedings of the 2021 International Conference on Cryptology in India, LNCS 13143. Cham: Springer, 2021: 159-178.
|
9 |
KELLY M, KAMINSKY A, KURDZIEL M, et al. Customizable sponge-based authenticated encryption using 16-bit S-boxes[C]// Proceedings of the 2015 IEEE Military Communications Conference. Piscataway: IEEE, 2015: 43-48. 10.1109/milcom.2015.7357416
|
10 |
李艳俊,张伟国,葛耀东,等. 基于多项式基的Camellia算法S盒硬件优化[J]. 电子与信息学报, 2023, 45(3):921-928. 10.11999/JEIT220499
|
|
LI Y J, ZHANG W G, GE Y D, et al. Hardware optimization of S-box of Camellia algorithm based on polynomial basis[J]. Journal of Electronics and Information Technology, 2023, 45(3):921-928. 10.11999/JEIT220499
|
11 |
中国科学院软件研究所. 一种快速的S盒透明阶检测方法: 200810102906.9[P]. 2008-09-03.
|
|
Institute of Software of Chinese Academy of Sciences. A fast detection method of S-box transparency order: 200810102906.9[P]. 2008-09-03.
|
12 |
中国科学院软件研究所. 一种S盒差分均匀性快速检测方法: 201010533858.6[P]. 2011-03-30.
|
|
Institute of Software of Chinese Academy of Sciences. A fast detection method for S-box differential uniformity: 201010533858.6[P]. 2011-03-30.
|
13 |
桂林电子科技大学. 密码S盒评估方法: 201611265264.5[P]. 2017-05-31.
|
|
Guilin University of Electronic Technology. Evaluation method of cryptographic S-box: 201611265264.5[P]. 2017-05-31.
|
14 |
蔡婧雯,韦永壮,刘争红. 基于GPU的密码S盒代数性质评估方法[J]. 计算机应用, 2022, 42(9): 2750-2756. 10.11772/j.issn.1001-9081.2021081382
|
|
CAI J W, WEI Y Z, LIU Z H. GPU-based method for evaluating the algebraic properties of cryptographic S-boxes[J]. Journal of Computer Applications, 2022, 42(9): 2750-2756. 10.11772/j.issn.1001-9081.2021081382
|
15 |
严迎建,郑震,郭朋飞,等. 一种检测S盒能量信息泄漏的t检验方法[J]. 北京理工大学学报, 2021, 41(5):542-547.
|
|
YAN Y J, ZHENG Z, GUO P F, et al. A t-test method for detecting power information leakage of S-box[J]. Transactions of Beijing Institute of Technology, 2021, 41(5): 542-547.
|
16 |
关杰,卢健伟,刘帅. 一类新的基于元胞自动机的S盒的线性性质研究[J]. 密码学报, 2021, 8(4): 650-659.
|
|
GUAN J, LU J W, LIU S. Research on linear properties of a new S-box based on cellular automata[J]. Journal of Cryptologic Research, 2021, 8(4): 650-659.
|
17 |
PICEK S, BATINA L, JAKOBOVIĆ D, et al. S-box, SET, match: a toolbox for S-box analysis[C]// Proceedings of the 2014 IFIP International Workshop on Information Security Theory and Practice, LNCS 8501. Berlin: Springer, 2014: 140-149.
|
18 |
BEHERA P K, GANGOPADHYAY S. BSAT: a new tool for analyzing cryptographic strength of Boolean function and S-Box of symmetric cryptosystem[M]// PANIGRAHI C R, PATI B, PATTANAYAK B K, et al. Progress in Advanced Computing and Intelligent Engineering: Proceedings of ICACIE 2020, AISC 1299. Singapore: Springer, 2021: 557-569. 10.1007/978-981-33-4299-6_46
|
19 |
中国电子科技集团公司第十五研究所,中电科(北京)信息测评认证有限公司. 一种用于测试对称密码组件安全性的系统及方法:202210785240.1[P]. 2022-10-14.
|
|
The 15th Research Institute of China Electronics Technology Group Corporation, CETC (Beijing) Information Evaluation and Certification Co., Ltd. A system and method for testing the security of symmetric cryptographic components:202210785240.1[P]. 2022-10-14.
|
20 |
MATSUI M. Linear cryptanalysis method for DES cipher[C]// Proceedings of the 1993 Workshop on the Theory and Application of Cryptographic Techniques, LNCS 765. Berlin: Springer, 1994: 386-397. 10.1007/3-540-48285-7_33
|
21 |
吴文玲,冯登国,张文涛. 分组密码的设计与分析[M]. 2版. 北京:清华大学出版社, 2009: 225-234.
|
|
WU W L, FENG D G, ZHANG W T. Design and Analysis of Block Cipher[M]. 2nd ed. Beijing: Tsinghua University Press, 2009: 225-234.
|