| 1 | SINGH P, ACHARYA B, CHAURASIYA R K. Lightweight cryptographic algorithms for resource-constrained IoT devices and sensor networks [M]// SHARMA S K, BHUSHAN B, DEBNATH N C. Security and privacy issues in IoT devices and sensor networks: a volume in advances in ubiquitous sensing applications for healthcare. New York: Academic Press, 2021: 153-185. | 
																													
																						| 2 | WU W, ZHANG L. LBlock: a lightweight block cipher[C]// Proceedings of the 2011 International Conference on Applied Cryptography and Network Security, LNCS 6715. Berlin: Springer, 2011: 327-344. | 
																													
																						| 3 | BOGDANOV A, KNUDSEN L R, LEANDER G, et al. PRESENT: an ultra-lightweight block cipher [C]// Proceedings of the 2007 International Workshop on Cryptographic Hardware and Embedded Systems, LNCS 4727. Berlin: Springer, 2007: 450-466. | 
																													
																						| 4 | GONG Z, NIKOVA S, LAW Y W. KLEIN: a new family of lightweight block ciphers [C]// Proceedings of the 2011 International Workshop on Radio Frequency Identification: Security and Privacy Issues. Berlin: Springer, 2012: 1-18. | 
																													
																						| 5 | BANIK S, BOGDANOV A, ISOBE T, et al. Midori: a block cipher for low energy[C]// Proceedings of the 2015 International Conference on the Theory and Application of Cryptology and Information Security, LNCS 9453. Berlin: Springer, 2015: 411-436. | 
																													
																						| 6 | GUO J, PEYRIN T, POSCHMANN A, et al. The LED block cipher[C]// Proceedings of the 2011 International Workshop on Cryptographic Hardware and Embedded Systems, LNCS 6917. Berlin: Springer, 2011: 326-341. | 
																													
																						| 7 | OJHA S K, KUMAR N, JAIN K, et al. TWIS — a lightweight block cipher [C]// Proceedings of the 2009 International Conference on Information Systems Security, LNCS 5905. Berlin: Springer, 2009:280-291. | 
																													
																						| 8 | HONG D, LEE J K, KIM D C, et al. LEA: a 128-bit block cipher for fast encryption on common processors [C]// Proceedings of the 2013 International Workshop on Information Security Applications, LNCS 8267. Cham: Springer, 2014: 3-27. | 
																													
																						| 9 | BANSOD G, PISHAROTY N, PATIL A. PICO: an ultra lightweight and low power encryption design for ubiquitous computing [J]. Defence Science Journal, 2016, 66(3): 259-265. | 
																													
																						| 10 | GUO Y, LI L, LIU B. Shadow: a lightweight block cipher for IoT nodes [J]. IEEE Internet of Things Journal, 2021, 8(16): 13014-13023. | 
																													
																						| 11 | SU B, WU W, ZHANG L, et al. Full-round differential attack on TWIS block cipher[C]// Proceedings of the 2010 International Workshop on Information Security Applications, LNCS 6513. Berlin: Springer, 2011: 234-242. | 
																													
																						| 12 | BLONDEAU C, PEYRIN T, WANG L. Known-key distinguisher on full PRESENT[C]// Proceedings of the 2015 Annual International Cryptology Conference, LNCS 9215. Berlin: Springer, 2015: 455-474. | 
																													
																						| 13 | TODO Y. Integral cryptanalysis on full MISTY1[J]. Journal of Cryptology, 2017, 30(3): 920-959. | 
																													
																						| 14 | LALLEMAND V, NAYA-PLASENCIA M. Cryptanalysis of KLEIN[C]// Proceedings of the 2014 International Workshop on Fast Software Encryption, LNCS 8540. Berlin: Springer, 2015: 451-470. | 
																													
																						| 15 | 王彩冰,张志宇,胡磊. 对轻量级分组密码 PICO 算法的差分攻击[J].密码学报, 2023, 10(4):685-701. | 
																													
																						|  | WANG C B, ZHANG Z Y, HU L. Differential cryptanalysis on ultra lightweight block cipher PICO [J]. Journal of Cryptologic Research, 2023, 10(4): 685-701. | 
																													
																						| 16 | GUO J, JEAN J, NIKOLIC I, et al. Invariant subspace attack against Midori 64 and the resistance criteria for S-box designs [J]. IACR Transactions on Symmetric Cryptology, 2016, 2016(1): 33-56. | 
																													
																						| 17 | KIM S, SHIN M, KIM S, et al. Shining light on the Shadow: full-round practical distinguisher for lightweight block cipher Shadow[EB/OL]. [2023-08-08].. | 
																													
																						| 18 | LI Y, LIN H, BI X, et al. MILP-based differential cryptanalysis on full-round Shadow[J]. Journal of Information Security and Applications, 2024, 81: No.103696. | 
																													
																						| 19 | BIHAM E, SHAMIR A. Differential cryptanalysis of DES-like cryptosystems [J]. Journal of Cryptology, 1991, 4: 3-72. | 
																													
																						| 20 | MATSUI M. The first experimental cryptanalysis of the Data Encryption Standard[C]// Proceedings of the 1994 Annual International Cryptology Conference, LNCS 839. Berlin: Springer, 1994: 1-11. | 
																													
																						| 21 | BARDET M, FAUGÈRE J C, SALVY B, et al. On the complexity of solving quadratic Boolean systems[J]. Journal of Complex, 2013, 29(1): 53-75. |