1 |
BOGDANOV A, KNEŽEVIĆ M, LEANDER G, et al. SPONGENT: a lightweight hash function[C]// Proceedings of the 2011 International Workshop on Cryptographic Hardware and Embedded Systems, LNCS 6917. Berlin: Springer, 2011: 312-325.
|
2 |
BOGDANOV A, KNEŽEVIĆ M, LEANDER G, et al. SPONGENT: the design space of lightweight cryptographic hashing[J]. IEEE Transactions on Computers, 2013, 62(10): 2041-2053. 10.1109/tc.2012.196
|
3 |
BOGDANOV A, KNUDSEN L R, LEANDER G, et al. PRESENT: an ultra-lightweight block cipher[C]// Proceedings of the 2007 International Workshop on Cryptographic Hardware and Embedded Systems, LNCS 4727. Berlin: Springer, 2007: 450-466.
|
4 |
ANKELE R, LIST E. Differential cryptanalysis of round-reduced Sparx-64/128[C]// Proceedings of the 2018 International Conference on Applied Cryptography and Network Security, LNCS 10892. Cham: Springer, 2018: 459-475.
|
5 |
ElSHEIKH M, YOUSSEF A M. Related-key differential cryptanalysis of full round CRAFT[C]// Proceedings of the 2019 International Conference on Security, Privacy, and Applied Cryptography Engineering, LNCS 11947. Cham: Springer, 2019: 50-66.
|
6 |
JI F L, ZHANG W T, ZHOU C N, et al. Improved (related-key) differential cryptanalysis on GIFT[C]// Proceedings of the 2020 International Conference on Selected Areas in Cryptography, LNCS 12804. Cham: Springer, 2021: 198-228.
|
7 |
杨继林,王念平. 类CLEFIA动态密码结构抵抗差分密码分析能力评估[J]. 电子学报, 2021, 49(11):2279-2283. 10.12263/DZXB.20180973
|
|
YANG J L, WANG N P. Security evaluation against differential cryptanalysis for CLEFIA-like dynamic cryptographic structure[J]. Acta Electronica Sinica, 2021, 49(11):2279-2283. 10.12263/DZXB.20180973
|
8 |
WEI Y C, XU P, RONG Y S. Related-key impossible differential cryptanalysis on lightweight cipher TWINE[J]. Journal of Ambient Intelligence and Humanized Computing, 2019, 10(2): 509-517. 10.1007/s12652-017-0675-1
|
9 |
MOGHADDAM A E, AHMADIAN Z. New automatic search method for truncated-differential characteristics application to Midori, SKINNY and CRAFT[J]. The Computer Journal, 2020, 63(12): 1813-1825. 10.1093/comjnl/bxaa004
|
10 |
HUTAHAEAN I W, LESTARI A A, SUSANTI B H. A tutorial of boomerang attack on SMALLPRESENT-[4][J]. Journal of Physics: Conference Series, 2021, 1836: No.012029. 10.1088/1742-6596/1836/1/012029
|
11 |
陈少真,薛平,杨行. 减轮GOST2的相关密钥差分攻击[J]. 信息工程大学学报, 2019, 20(3):335-339, 345. 10.3969/j.issn.1671-0673.2019.03.014
|
|
CHEN S Z, XUE P, YANG X. Related-key differential attack of reduced rounds of GOST2[J]. Journal of Information Engineering University, 2019, 20(3):335-339, 345. 10.3969/j.issn.1671-0673.2019.03.014
|
12 |
MOUHA N, WANG Q J, GU D W, et al. Differential and linear cryptanalysis using mixed-integer linear programming[C]// Proceedings of the 2011 International Conference on Information Security and Cryptology, LNCS 7537. Berlin: Springer, 2012: 57-76.
|
13 |
GROSSO V, LEURENT G, STANDAERT F X, et al. LS-designs: bitslice encryption for efficient masked software implementations[C]// Proceedings of the 2014 International Workshop on Fast Software Encryption, LNCS 8540. Berlin: Springer, 2015: 18-37.
|
14 |
BANIK S, PANDEY S K, PEYRIN T, et al. GIFT: a small present: towards reaching the limit of lightweight encryption[C]// Proceedings of the 2017 International Conference on Cryptographic Hardware and Embedded Systems, LNCS 10529. Cham: Springer, 2017: 321-345.
|
15 |
SUN S W, HU L, WANG P, et al. Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, LBlock, DES(L) and other bit-oriented block ciphers[C]// Proceedings of the 2014 International Conference on the Theory and Application of Cryptology and Information Security, LNCS 8873. Berlin: Springer, 2014: 158-178.
|
16 |
SASAKI Y, TODO Y. New algorithm for modeling S-box in MILP based differential and division trail search[C]// Proceedings of the 2017 International Conference for Information Technology and Communications, LNCS 10543. Cham: Springer, 2017: 150-165.
|
17 |
ZHU B Y, DONG X Y, YU H B. MILP-based differential attack on round-reduced GIFT[C]// Proceedings of the 2019 Cryptographers’ Track at the RSA Conference, LNCS 11405. Cham: Springer, 2019: 372-390.
|
18 |
BAGHERZADEH E, AHMADIAN Z. MILP-based automatic differential search for LEA and HIGHT block ciphers[J]. IET Information Security, 2020, 14(5): 595-603. 10.1049/iet-ifs.2018.5539
|
19 |
KUMAR M, YADAV T. MILP based differential attack on round reduced WARP[C]// Proceedings of the 2021 International Conference on Security, Privacy, and Applied Cryptography Engineering, LNCS 13162. Cham: Springer, 2022: 42-59.
|