[1]KWON D, KIM J, PARK S, et al. New block cipher: ARIA [C]// ICISC 2003: Proceedings of 6th International Conference on Information Security and Cryptology. Berlin: Springer-Verlag, 2004: 432-445.[2]BIRYUKOV A, CANNIERE C D, LANO J, et al. Security and per-formance analysis of ARIA, Version 1.2 [EB/OL]. [2009-11-12]. http://cloud.ttongfly.net/t/attachment/1321529635.pdf.[3]WU WEN-LING, ZHANG WEN-TAO, FENG DENG-GUO. Impossible differential cryptanalysis of reduced-round ARIA and Camellia [J]. Journal of Computer Science and Technology, 2007, 22(3): 449-456.[4]LI SHENHUA, SONG CHUNYAN. Improved impossible differential cryptanalysis of ARIA [C]// ISA 2008: Proceedings of 2008 International Conference on Information Security and Assurance. Washington, DC: IEEE Computer Society, 2008: 129-132.[5]LI RUILIN, SUN BING, ZHANG PENG, et al. New impossible differential cryptanalysis of ARIA [EB/OL]. [2010-05-10]. http://eprint.iacr.org/2010/307.pdf.[6]DU CHENGHANG, CHEN JIAZHE. Impossible differential cryptanalysis of ARIA reduced to 7 rounds [C]// CANS 2010: Proceedings of the 9th International Workshop on Cryptology and Network Security. Berlin: Springer-Verlag, 2010: 20-30.[7]TANG XUEHAI, SUN BING, LI RUILIN, et al. A meet-in-the-middle attack on ARIA [DB/OL]. [2010-12-23]. http://eprint.iacr.org/2010/168.[8]LI YANJUN, WU WENLING, ZHANG LEI. Integral attacks on reduced-round ARIA block cipher [C]// ISPEC 2010: Proceedings of the 6th Information Security Practice and Experience Conference. Berlin: Springer-Verlag, 2010: 19-29.[9]韦永壮.新区分器的构造及其在分组密码分析中的应用[D].西安:西安电子科技大学,2009.[10]National Security Research Institute. Specification of ARIA, Version 1.0 [EB/OL]. [2009-11-20]. http://www.nsri.re.kr/ARIA/doc/ARIA-specification-e.pdf.[11]BIHAM E, BIRYUKOV A, SHAMIR A. Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials [C]// Eurocrypt'99: Proceedings of 1999 International Conference on the Theory and Application of Cryptographic Techniques. Berlin: Springer-Verlag, 1999: 12-23.[12]吴文玲,冯登国,张文涛.分组密码的设计与分析[M].北京:清华大学出版社,2009:120-130.[13]张庆贵.不可能差分攻击中的明文筛选方法[J].计算机工程,2010,36(2):127-129.[14]LI RUILIN, SUN BING, LI CHAO. Impossible differential cryptanalysis of SPN ciphers [J]. IET Information Security, 2011, 5(2): 111-120. |