[1] BEAULIEU R, SHORS D, SMITH J, et al. The SIMON and speck families of lightweight block ciphers[EB/OL]. (2013-06-19)[2017-01-16]. http://eprint.iacr.org/2013/404.pdf. [2] ALIZADEH J, BAGHERI N, GAURAVARAM P, et al. Linear cryptanalysis of round reduced SIMON[EB/OL]. (2014-10-16)[2017-01-16]. http://eprint.iacr.org/2013/663.pdf. [3] ALKHZAIMI H A, LAURIDSEN M M. Cryptanalysis of the SIMON family of block ciphers[EB/OL]. (2013-08-28)[2017-01-16]. http://eprint.iacr.org/2013/543.pdf. [4] ALIZADEH J, ALKHZAIMI H A, AREF M R, et al. Cryptanalysis of SIMON variants with connections[C]//RFIDSec 2014:Proceedings of the 10th Workshop on Radio Frequency Identification:Security and Privacy Issues. Berlin:Springer, 2014:90-107. [5] RADDUM H. Algebraic analysis of the SIMON block cipher family[C]//LatinCrypt 2015:Proceedings of the Fourth International Conference on Cryptology and Information Security in Latin America. Berlin:Springer, 2015:157-169. [6] 万刘蝉,韦永壮.简化SIMON类算法的立方测试与分析[J].计算机应用研究,2017,34(1):246-250.(WAN L C, WEI Y Z. Cube test and analysis for reduced SIMON family of block ciphers[J]. Application Research of Computers, 2017, 34(1):246-250.) [7] BONEH D, DEMILLO R A, LIPTON R J. On the importance of checking cryptographic protocols for faults[C]//EUROCRYPT 1997:Proceedings of the 14th Annual EUROCRYPT Conference on the Theory and Applications of Cryptologic Techniques. Berlin:Springer, 1997:37-51. [8] BAR-EL H, CHOUKRI H, NACCACHE D, et al. The sorcerer's apprentice guide to fault attack[EB/OL]. (2004-05-07)[2017-01-16]. http://eprint.iacr.org/2004/100.pdf. [9] FUKUNAGA T, TAKAHASHI J. Practical fault attack on a cryptographic LSI with ISO/IEC 18033-3 block ciphers[C]//FDTC 2009:Proceedings of the 2009 Fault Diagnosis and Tolerance in Cryptography. New York:ACM, 2009:84-92. [10] BIHAM E, SHAMIR A. Differential fault analysis of secret key cryptosystems[C]//CRYPTO 1997:Proceedings of the 17th Annual International Cryptology Conference. Berlin:Springer, 1997:513-525. [11] COURTOIS N, WARE D, JACKSON K. Fault-algebraic attacks on inner rounds of DES[EB/OL]. (2010-09-22)[2017-01-16]. http://www.nicolascourtois.com/papers/dfasolv.pdf. [12] 吴克辉,赵新杰,王韬,等.PRESENT密码代数故障攻击[J].通信学报,2012,33(8):85-92.(WU K H, ZHAO X J, WANG T, et al. Algebraic fault attack on PRESENT[J]. Journal on Communications, 2012, 33(8):85-92.) [13] 赵新杰,郭世泽,王韬,等.Piccolo密码代数故障分析研究[J].计算机学报,2013,36(4):882-894.(ZHAO X J, GUO S Z, WANG T, et al. Research of algebraic fault analysis on Piccolo[J]. Chinese Journal of Computers, 2013, 36(4):882-894.) [14] TUPSAMUDRE H, BISHT S, MUKHOPADHYAY D. Differential fault analysis on the families of SIMON and SPECK ciphers[EB/OL]. (2014-05-30)[2017-01-16]. http://eprint.iacr.org/2014/267.pdf. [15] TAKAHASHI J, FUKUNAGA T. Fault analysis on SIMON family of lightweight block ciphers[C]//ICISC 2014:Proceedings of the 2014 International Conference on Information Security and Cryptology. Berlin:Springer, 2014:175-189. [16] VáSQUEZ J C G, BORGES F, PORTUGAL R, et al. An efficient one-bit model for differential fault analysis on SIMON family[C]//FDTC 2015:Proceedings of the 2015 Fault Diagnosis and Tolerance in Cryptography. Washington DC:IEEE Computer Society, 2015:61-70. |