1 |
KRISHNAMURTHY G N, RAMASWAMY V, LEELA G H, et al. Blow-CAST-Fish: a new 64-bit block cipher[J]. International Journal of Computer Science and Network Security, 2008, 8(4):282-290.
|
2 |
SCHNEIER B. Description of a new variable-length key, 64-bit block cipher (Blowfish)[C]// Proceedings of the 1993 International Conference on Fast Software Encryption, LNCS 809. Berlin: Springer, 1994:191-204.
|
3 |
ADAMS C. RFC 2144: the CAST-128 encryption algorithm[EB/OL]. [2021-03-21]..
|
4 |
VAUDENAY S. On the weak keys of Blowfish[C]// Proceedings of the 1996 International Conference on Fast Software Encryption, LNCS 1039. Berlin: Springer, 1996: 27-32.
|
5 |
WANG M Q, WANG X Y, CHOW K P, et al. New differential cryptanalysis results for reduced round CAST-128[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2010, E93-A(12):2744-2754. 10.1587/transfun.e93.a.2744
|
6 |
孙晓玲,王美琴,李忠,等. 低轮Blow-CAST-Fish算法的差分攻击[J]. 计算机工程, 2012, 38(12):99-101. 10.3969/j.issn.1000-3428.2012.12.029
|
|
SUN X L, WANG M Q, LI Z, et al. Differential attack on reduced-round Blow-CAST-Fish algorithm[J]. Computer Engineering, 2012, 38(12):99-101. 10.3969/j.issn.1000-3428.2012.12.029
|
7 |
孙晓玲,王美琴,孙旭光,等. 16轮Blow-CAST-Fish的弱密钥攻击[J]. 计算机工程与应用, 2011,47(35):110-112. 10.3778/j.issn.1002-8331.2011.35.031
|
|
SUN X L, WANG M Q, SUN X G, et al. Weak-key attack on 16-round Blow-CAST-Fish[J]. Computer Engineering and Applications, 2011, 47(35): 110-112. 10.3778/j.issn.1002-8331.2011.35.031
|
8 |
WANG S M, CUI T T, WANG M Q. Improved differential cryptanalysis of CAST-128 and CAST-256[C]// Proceedings of the 2016 International Conference on Information Security and Cryptology, LNCS 10143. Cham: Springer, 2017:18-32.
|
9 |
SEKI H, KANEKO T. Differential cryptanalysis of CAST-256 reduced to nine quad-rounds[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2001, E84-A(4):913-918. 10.1007/3-540-44983-3_23
|
10 |
CUI T T, CHEN H F, WEN L, et al. Statistical integral attack on CAST-256 and IDEA[J]. Cryptography and Communication, 2018, 10(1): 195-209. 10.1007/s12095-017-0245-6
|
11 |
郑向前,张文英,肖祯,等. 缩减轮数的CAST-256积分分析[J]. 计算机应用研究, 2017, 34(1): 221-223. 10.3969/j.issn.1001-3695.2017.01.050
|
|
ZHENG X Q, ZHANG W Y, XIAO Z, et al. Integral cryptanalytic on reduced-round of CAST-256[J]. Application Research of Computers, 2017, 34(1): 221-223. 10.3969/j.issn.1001-3695.2017.01.050
|
12 |
倪博煜,董晓阳. 改进的Type-1型广义Feistel结构的量子攻击及其在分组密码CAST-256上的应用[J]. 电子与信息学报, 2020, 42(2): 295-306. 10.11999/JEIT190633
|
|
NI B Y, DONG X Y. Improved quantum attack on Type-1 generalized Feistel scheme and its application to CAST-256[J]. Journal of Electronics and Information Technology, 2020, 42(2): 295-306. 10.11999/JEIT190633
|
13 |
WANG M Q, CUI T T, CHEN H F, et al. Integrals go statistical: cryptanalysis of full skipjack variants[C]// Proceedings of the 2016 International Conference on Fast Software Encryption, LNCS 9783. Berlin: Springer, 2016: 399-415.
|
14 |
ZONG R, DONG X Y, WANG X Y. Related-tweakey impossible differential attack on reduced-round Deoxys-BC-256[J]. SCIENCE CHINA Information Sciences, 2019, 62(3): No.32102. 10.1007/s11432-017-9382-2
|
15 |
GUO H, SUN S W, SHI D P, et al. Differential attacks on CRAFT exploiting the involutory S-boxes and tweak additions[J]. IACR Transactions on Symmetric Cryptology, 2020, 2020(3):119-151. 10.46586/tosc.v2020.i3.119-151
|
16 |
ITO G, HOSOYAMADA A, MATSUMOTO R, et al. Quantum chosen-ciphertext attacks against Feistel ciphers[C]// Proceedings of the 2019 Cryptographers’ Track at the RSA Conference, LNCS 11405. Cham: Springer, 2019: 391-411.
|
17 |
HOSOYAMADA A, SASAKI Y. Quantum Demiric-Selçuk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions[C]// Proceedings of the 2018 International Conference on Security and Cryptography for Networks, LNCS 11035. Cham: Springer, 2018:386-403.
|
18 |
DONG X Y, WANG X Y. Quantum key recovery attack on Feistel structures[J]. Science China Information Sciences, 2018, 61(10): No.102501. 10.1007/s11432-017-9468-y
|
19 |
DONG X Y, LI Z, WANG X Y. Quantum cryptanalysis on some generalized Feistel schemes[J]. SCIENCE CHINA Information Sciences, 2019, 62(2): No.22501. 10.1007/s11432-017-9436-7
|