[1]LEE C, CHA Y. The block cipher: SNAKE with provable resistance against DC and LC attacks [C]// Proceedings of 1997 Korea-Japan Joint Workshop on Information Security and Cryptology. Berlin: Springer, 1997:3-7.
[2]MORIAI S, SHIMOYAMA T, KANEKO T. Interpolation attacks of the block cipher: SNAKE [C]// Proceedings of the 6th International Workshop on Fast Software Encryption. Berlin: Springer, 1997:275-289.hangsha: National University of Defense Technology, 2009.(孙兵.分组密码的分析方法及应用研究 [D]. 长沙:国防科学技术大学,2009.)
[4]WEI Y, SUN B, LI C. A meet-in-the-middle attack on reduced-round SNAKE(2) [J]. Computer Engineering and Science, 2012,34(6):28-31.(魏悦川,孙兵,李超.对简化轮数的SNAKE(2)算法的中间相遇攻击[J].计算机工程与科学,2012,34(6):28-31.
[5]DAEMEN J, KNUDSEN L R, RIJMEN V. The block cipher square [C]// Proceedings of the 1997 4th International Workshop on Fast Software Encryption, LNCS 1267. Berlin: Springer, 1997:149-165.
[6]LUCKS S. The saturation attack—a bait for twofish [C]// Proceedings of the 2001 8th International Workshop on Fast Software Encryption. Berlin: Springer, 2002:112-127.
[7]BIRYUKOV A, SHAMIR A. Structural cryptanalysis of SASAS[C]// Advances in Cryptology-EUROCRYPT 2001, LNCS 2045. Berlin: Springer, 2001: 394-405.
[8]ZABA M R, RADDUM H, HENRICKSEN M, et al.Bit-pattern based integral attack[C]// Proceedings of the 2008 15th International Workshop on Fast Software Encryption. Berlin: Springer, 2008:363-381.
[9]KNUDSEN L, WAGNER D. Integral cryptanalysis [C]// Proceedings of the 2002 9th International Workshop on Fast Software Encryption. Berlin: Springer, 2002:112-127.
[10]FERGUSON N, KELSEY J, LUCKS S, et al.Improved cryptanalysis of Rijndael[C]// Proceedings of the 1978 7th International Workshop on Fast Software Encryption. Berlin: Springer, 2001:213-230.
[11]LI Y, WU W, ZHANG L. Integral attacks on reduced round ARIA block cipher [C]// Proceedings of the 2010 6th Information Security Practice and Experience Conference. Berlin: Springer, 2010:19-29.
[12]LIU F, JI W, HU L, et al.Analysis of the SMS4 block cipher [C]// Proceedings of the 2007 Australasian Conference on Information Security and Privacy. Berlin: Springer, 2007:158-170.
[13]WU W, ZHANG W, FENG D. Integral cryptanalysis of reduced FOX block cipher [C]// Proceedings of the 2005 International Conference on Information Security and Cryptography. Berlin:Springer, 2006:229-241.
[14]ZHANG P, SUN B, LI C. Saturation attack on the block cipher HIGHT [C]// Proceedings of the 2009 8th International Conference on Cryptology and Network Security. Berlin:Springer, 2009:76-86.
[15]LI Y, WU W. ZHANG L, et al.Improved integral attacks on reduced round Camellia [EB/OL]. [2014-03-04]. https://eprint.iacr.org/2011/163.
[16]DUO L, LI C, FENG K. Square like attack on Camellia [C]// Proceedings of the 2007 9th International Conference on Information and Communication Security. Berlin: Springer, 2007:269-283. |