1 |
BENNETT C H, SHOR P W. Quantum information theory[J]. IEEE Transactions on Information Theory, 1998, 44(6): 2724-2742. 10.1109/18.720553
|
2 |
National Institute of Standards and Technology. Lightweight cryptography-round-1-candidates[EB/OL]. [2020-08-12].. 10.3390/electronics9111940
|
3 |
BEIERLE C, BIRYUKOV A, CARDOSO DOS SANTOS L, et al. Lightweight AEAD and hashing using the SPARKLE permutation family[J]. IACR Transactions on Symmetric Cryptology, 2020, 2020(S1): 208-261. 10.46586/tosc.v2020.is1.208-261
|
4 |
BANIK S, CHAKRABORTI A, IWATA T, et al. GIFT-COFB[EB/OL]. (2020-06-18) [2021-06-12]..
|
5 |
中国密码学会. 关于举办全国密码算法设计竞赛的通知[EB/OL]. (2018-06-11) [2021-06-12].. 10.17706/jcp.11.2.140-148
|
|
Chinese Association for Cryptologic Research. Notice on holding a national cryptographic algorithm design competition[EB/OL]. (2018-06-11) [2021-06-12].. 10.17706/jcp.11.2.140-148
|
6 |
徐洪,段明,谭林,等. NBC算法[J]. 密码学报, 2019, 6(6): 760-767. 10.13868/j.cnki.jcr.000339
|
|
XU H, DUAN M, TAN L, et al. On the NBC algorithm[J]. Journal of Cryptologic Research, 2019, 6(6): 760-767. 10.13868/j.cnki.jcr.000339
|
7 |
田甜,戚文峰,叶晨东,等. 基于NFSR的分组密码算法SPRING[J]. 密码学报, 2019, 6(6): 815-834. 10.13868/j.cnki.jcr.000343
|
|
TIAN T, QI W F, YE C D, et al. SPRING: a family of small hardware-oriented block ciphers based on NFSRs[J]. Journal of Cryptologic Research, 2019, 6(6): 815-834. 10.13868/j.cnki.jcr.000343
|
8 |
BEIERLE C, CARDOSO DOS SANTOS L, et al. Alzette: a 64-bit ARX-box (feat. CRAX and TRAX)[C]// Proceedings of the 2020 Annual International Cryptology Conference, LNCS 12172 . Cham: Springer, 2020: 419-448.
|
9 |
CANTEAUT A, DUVAL S, LEURENT G. Construction of lightweight S-boxes using Feistel and MISTY structures[C]// Proceedings of the 2015 International Conference on Selected Areas in Cryptography, LNCS 9566. Cham: Springer, 2016: 373-393.
|
10 |
GHOSHAL A, SADHUKHAN R, PATRANABIS S, et al. Lightweight and side-channel secure 4×4 S-boxes from cellular automata rules[J]. IACR Transactions on Symmetric Cryptology, 2018, 2018(3): 311-334. 10.46586/tosc.v2018.i3.311-334
|
11 |
PICEK S, MARIOT L, YANG B H, et al. Design of S-boxes defined with cellular automata rules[C]// Proceedings of the 2017 ACM International Conference on Computing Frontiers. New York: ACM, 2017: 409-414. 10.1145/3075564.3079069
|
12 |
LI H Z, ZHOU Y B, MING J D, et al. The notion of transparency order, revisited[J]. The Computer Journal, 2020, 63(12): 1915-1938. 10.1093/comjnl/bxaa069
|
13 |
MARIOT L, PICEK S, LEPORATI A, et al. Cellular automata-based S-boxes[J]. Cryptography and Communications, 2019, 11(1): 41-62. 10.1007/s12095-018-0311-8
|
14 |
BIHAM E, SHAMIR A. Differential cryptanalysis of DES-like cryptosystems[J]. Journal of Cryptology, 1991, 4(1): 3-72. 10.1007/bf00630563
|
15 |
MATSUI M. Linear cryptanalysis method for DES cipher[C]// Proceedings of the 1993 Workshop on the Theory and Application of Cryptographic Techniques, LNCS 765. Berlin: Springer, 1994: 386-397.
|
16 |
KOCHER P, JAFFE J, JUN B. Differential power analysis[C]// Proceedings of the 1999 Annual International Cryptology Conference, LNCS 1666. Berlin: Springer, 1999: 388-397.
|
17 |
KEDEM G, ISHIHARA Y. Brute force attack on UNIX passwords with SIMD computer[C]// Proceedings of the 8th USENIX Security Symposium. Berkeley: USENIX Association, 1999: 93-98.
|
18 |
MANAVSKI S A. CUDA compatible GPU as an efficient hardware accelerator for AES cryptography[C]// Proceedings of the 2007 IEEE International Conference on Signal Processing and Communications. Piscataway: IEEE, 2007: 65-68. 10.1109/icspc.2007.4728256
|
19 |
CHEONG H S, LEE W K. Fast implementation of block ciphers and PRNGs for Kepler GPU architecture[C]// Proceedings of the 5th International Conference on IT Convergence and Security. Piscataway: IEEE, 2015: 1-5. 10.1109/icitcs.2015.7292982
|
20 |
YEOH W Z, TEH J S, CHEN J G. Automated search for block cipher differentials: a GPU-accelerated branch-and-bound algorithm[C]// Proceedings of the 2020 Australasian Conference on Information Security and Privacy, LNCS 12248. Cham: Springer, 2020: 160-179.
|
21 |
李超,孙兵,李瑞林. 分组密码的攻击方法与实例分析[M]. 北京:科学出版社, 2010:72-73, 98-100.
|
|
LI C, SUN B, LI R L. Attack Method and Case Analysis of Block Cipher[M]. Beijing: Science Press, 2010: 72-73, 98-100.
|