| 1 | WEBSTER A F, TAVARES S E. On the design of S-boxes[C]// Proceedings of the 1985 Conference on the Theory and Application of Cryptographic Techniques, LNCS 218. Berlin: Springer, 1986: 523-534.  10.1007/3-540-39799-x_41 | 
																													
																							| 2 | ADAMS C, TAVARES S. The structured design of cryptographically good S-boxes[J]. Journal of Cryptology, 1990, 3(1): 27-41.  10.1007/bf00203967 | 
																													
																							| 3 | DETOMBE J, TAVARES S. Constructing large cryptographically strong S-boxes[C]// Proceedings of the 1992 International Workshop on the Theory and Application of Cryptographic Techniques, LNCS 718. Berlin: Springer, 1993: 165-181.  10.1007/3-540-57220-1_60 | 
																													
																							| 4 | MILLAN W. How to improve the nonlinearity of bijective S-boxes[C]// Proceedings of the 1998 Australasian Conference on Information Security and Privacy, LNCS 1438. Berlin: Springer, 1998: 181-192. | 
																													
																							| 5 | MATSUI M. New block encryption algorithm MISTY[C]// Proceedings of the 1997 International Workshop on Fast Software Encryption, LNCS 1267. Berlin: Springer, 1997: 54-68. | 
																													
																							| 6 | CARLET C, DALAI D K, GUPTA K C, et al. Algebraic immunity for cryptographically significant Boolean functions: analysis and construction[J]. IEEE Transactions on Information Theory, 2006, 52(7): 3105-3121.  10.1109/tit.2006.876253 | 
																													
																							| 7 | STOFFELEN K. Optimizing S-box implementations for several criteria using SAT solvers[C]// Proceedings of the 2016 International Conference on Fast Software Encryption, LNCS 9783. Berlin: Springer, 2016: 140-160. | 
																													
																							| 8 | LU Z, WANG W, HU K, et al. Pushing the limits: searching for implementations with the smallest area for lightweight S-boxes[C]// Proceedings of the 2021 International Conference on Cryptology in India, LNCS 13143. Cham: Springer, 2021: 159-178. | 
																													
																							| 9 | KELLY M, KAMINSKY A, KURDZIEL M, et al. Customizable sponge-based authenticated encryption using 16-bit S-boxes[C]// Proceedings of the 2015 IEEE Military Communications Conference. Piscataway: IEEE, 2015: 43-48.  10.1109/milcom.2015.7357416 | 
																													
																							| 10 | 李艳俊,张伟国,葛耀东,等. 基于多项式基的Camellia算法S盒硬件优化[J]. 电子与信息学报, 2023, 45(3):921-928.  10.11999/JEIT220499 | 
																													
																							|  | LI Y J, ZHANG W G, GE Y D, et al. Hardware optimization of S-box of Camellia algorithm based on polynomial basis[J]. Journal of Electronics and Information Technology, 2023, 45(3):921-928.  10.11999/JEIT220499 | 
																													
																							| 11 | 中国科学院软件研究所. 一种快速的S盒透明阶检测方法: 200810102906.9[P]. 2008-09-03. | 
																													
																							|  | Institute of Software of Chinese Academy of Sciences. A fast detection method of S-box transparency order: 200810102906.9[P]. 2008-09-03. | 
																													
																							| 12 | 中国科学院软件研究所. 一种S盒差分均匀性快速检测方法: 201010533858.6[P]. 2011-03-30. | 
																													
																							|  | Institute of Software of Chinese Academy of Sciences. A fast detection method for S-box differential uniformity: 201010533858.6[P]. 2011-03-30. | 
																													
																							| 13 | 桂林电子科技大学. 密码S盒评估方法: 201611265264.5[P]. 2017-05-31. | 
																													
																							|  | Guilin University of Electronic Technology. Evaluation method of cryptographic S-box: 201611265264.5[P]. 2017-05-31. | 
																													
																							| 14 | 蔡婧雯,韦永壮,刘争红. 基于GPU的密码S盒代数性质评估方法[J]. 计算机应用, 2022, 42(9): 2750-2756.  10.11772/j.issn.1001-9081.2021081382 | 
																													
																							|  | CAI J W, WEI Y Z, LIU Z H. GPU-based method for evaluating the algebraic properties of cryptographic S-boxes[J]. Journal of Computer Applications, 2022, 42(9): 2750-2756.  10.11772/j.issn.1001-9081.2021081382 | 
																													
																							| 15 | 严迎建,郑震,郭朋飞,等. 一种检测S盒能量信息泄漏的t检验方法[J]. 北京理工大学学报, 2021, 41(5):542-547. | 
																													
																							|  | YAN Y J, ZHENG Z, GUO P F, et al. A t-test method for detecting power information leakage of S-box[J]. Transactions of Beijing Institute of Technology, 2021, 41(5): 542-547. | 
																													
																							| 16 | 关杰,卢健伟,刘帅. 一类新的基于元胞自动机的S盒的线性性质研究[J]. 密码学报, 2021, 8(4): 650-659. | 
																													
																							|  | GUAN J, LU J W, LIU S. Research on linear properties of a new S-box based on cellular automata[J]. Journal of Cryptologic Research, 2021, 8(4): 650-659. | 
																													
																							| 17 | PICEK S, BATINA L, JAKOBOVIĆ D, et al. S-box, SET, match: a toolbox for S-box analysis[C]// Proceedings of the 2014 IFIP International Workshop on Information Security Theory and Practice, LNCS 8501. Berlin: Springer, 2014: 140-149. | 
																													
																							| 18 | BEHERA P K, GANGOPADHYAY S. BSAT: a new tool for analyzing cryptographic strength of Boolean function and S-Box of symmetric cryptosystem[M]// PANIGRAHI C R, PATI B, PATTANAYAK B K, et al. Progress in Advanced Computing and Intelligent Engineering: Proceedings of ICACIE 2020, AISC 1299. Singapore: Springer, 2021: 557-569.  10.1007/978-981-33-4299-6_46 | 
																													
																							| 19 | 中国电子科技集团公司第十五研究所,中电科(北京)信息测评认证有限公司. 一种用于测试对称密码组件安全性的系统及方法:202210785240.1[P]. 2022-10-14. | 
																													
																							|  | The 15th Research Institute of China Electronics Technology Group Corporation, CETC (Beijing) Information Evaluation and Certification Co., Ltd. A system and method for testing the security of symmetric cryptographic components:202210785240.1[P]. 2022-10-14. | 
																													
																							| 20 | MATSUI M. Linear cryptanalysis method for DES cipher[C]// Proceedings of the 1993 Workshop on the Theory and Application of Cryptographic Techniques, LNCS 765. Berlin: Springer, 1994: 386-397.  10.1007/3-540-48285-7_33 | 
																													
																							| 21 | 吴文玲,冯登国,张文涛. 分组密码的设计与分析[M]. 2版. 北京:清华大学出版社, 2009: 225-234. | 
																													
																							|  | WU W L, FENG D G, ZHANG W T. Design and Analysis of Block Cipher[M]. 2nd ed. Beijing: Tsinghua University Press, 2009: 225-234. |