[1] KAYSER R F. Announcing request for candidate algorithm nominations for a new cryptographic hash algorithm (SHA-3) family[J]. Federal Register, 2007, 72(212):62. [2] National Institute of Standards and Technology. SHA-3 competition[EB/OL].[2012-02-10].https://csrc.nist.gov/projects/hash-functions/sha-3-project. [3] BERTONI G, DAEMEN J, PEETERS M, et al. Keccak[C]//EUROCRYPT 2013:Proceedings of the 2013 Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2013:313-314. [4] DWORKIN M J. SHA-3 standard:permutation-based hash and extendable-output functions[EB/OL].[2018-01-10]. https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf. [5] BERTONI G, DAEMEN J, PEETERS M, et al. Cryptographic sponge functions[EB/OL].[2017-04-10]. https://keccak.team/files/CSF-0.1.pdf. [6] BERTONI G, DAEMEN J, PEETERS M, et al. Team Keccak[EB/OL].[2017-08-22]. https://keccak.team/index.html. [7] DINUR I, DUNKELMAN O, SHAMIR A. New attacks on Keccak-224 and Keccak-256[C]//FSE 2012:Proceedings of the 2012 International Workshop on Fast Software Encryption. Berlin:Springer, 2012:442-461. [8] QIAO K, SONG L, LIU M, et al. New collision attacks on round-reduced Keccak[C]//EUROCRYPT 2017:Proceedings of the 2017 Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2017:216-243. [9] BERTONI G, DAEMEN J, PEETERS M, et al. The Keccak crunchy crypto collision and pre-image contest[EB/OL].[2017-05-16]. https://keccak.team/crunchy_contest.html. [10] SONG L, LIAO G, GUO J. Non-full sbox linearization:applications to collision attacks on round-reduced Keccak[C]//CRYPTO 2017:Proceedings of the 2017 Annual International Cryptology Conference. Berlin:Springer, 2017:428-451. [11] JEAN J, NIKOLIC I. Internal differential boomerangs:practical analysis of the round-reduced Keccak-f permutation[C]//FSE 2015:Proceedings of the 2015 International Workshop on Fast Software Encryption. Berlin:Springer, 2015:537-556. [12] AUMASSON J P, MEIER W. Zero-sum distinguishers for reduced Keccak-f and for the core functions of Luffa and Hamsi[EB/OL].[2018-01-10]. https://131002.net/data/papers/AM09.pdf. [13] GUO J, LIU M, SONG L. Linear structures:applications to cryptanalysis of round-reduced Keccak[C]//ASIACRYPT 2016:Proceedings of the 2016 International Conference on the Theory and Application of Cryptology and Information Security. Berlin:Springer, 2016:249-274. [14] HUANG S, WANG X, XU G, et al. Conditional cube attack on reduced-round Keccak sponge function[C]//EUROCRYPT 2017:Proceedings of the 2017 Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2017:259-288. [15] 董晓阳.几个重要对称密码和通用密码结构的分析[D]. 济南:山东大学, 2017:25-45. (DONG X Y. Gryptanalysis of several symmetric ciphers and generic structures[D]. Jinan:Shandong University, 2017:25-45.) [16] GUO J, LING S, RECHBERGER C, et al. Advanced meet-in-the-middle preimage attacks:first results on full tiger and improved results on MD4 and SHA-2[C]//ASIACRYPT 2010:Proceedings of the 2010 International Conference on the Theory and Application of Cryptology and Information Security. Berlin:Springer, 2010:56-75. [17] BERTONI G, DAEMEN J, PEETERS M, et al. The Keccak reference V3.0[EB/OL].[2017-05-17]. https://keccak.team/files/Keccak-reference-3.0.pdf. |