1 |
BEN-AROYA I, BIHAM E. Differential cryptanalysis of Lucifer[C]// Proceedings of the 13th Annual International Cryptology Conference. Berlin: Springer, 1993: 187-199.
|
2 |
NYBERG K. S-boxes and round functions with controllable linearity and differential uniformity [C]// Proceedings of the 2nd International Workshop on Fast Software Encryption. Berlin: Springer, 1994: 111-130.
|
3 |
NYBERG K. On the construction of highly nonlinear permutations[C]// Proceedings of the 1992 Workshop on the Theory and Application of Cryptographic Techniques. Berlin: Springer, 1992: 92-98.
|
4 |
PROUFF E. DPA attacks and S-boxes [C]// Proceedings of the 12th International Workshop on Fast Software Encryption. Berlin: Springer, 2005: 424-441.
|
5 |
COOK S. CUDA Programming: a Developer’s Guide to Parallel Computing with GPUs [M]. San Francisco: Morgan Kaufmann Publishers Inc., 2012:21-36.
|
6 |
乐德广, 常晋义, 刘祥南,等. 基于GPU的MD5高速解密算法的实现[J].计算机工程,2010,36(11): 154-155.
|
|
LE D G, CHANG J Y, LIU X N, et al. Implementation of MD5 fast decryption algorithm based on graphic processing unit [J]. Computer Engineering, 2010, 36(11): 154-155.
|
7 |
张润梅, 王霄. 基于CUDA架构的MD5破解方法研究[J]. 计算机科学, 2011, 38(2):302-304.
|
|
ZHANG R M, WANG X. MD5 crack method based on compute unified device architecture [J]. Computer Science, 2011, 38(2): 302-304.
|
8 |
夏春林,周德云,张堃. AES算法的CUDA高效实现方法[J].计算机应用研究,2013,30(6):1907-1909.
|
|
XIA C L, ZHOU D Y, ZHANG K. CUDA based high-efficiency implementation of AES algorithm [J]. Application Research of Computers, 2013, 30(6):1907-1909.
|
9 |
费雄伟, 李肯立, 阳王东, 等. 基于CUDA的并行AES算法的实现和加速效率探索[J]. 计算机科学, 2015, 42(1): 59-62.
|
|
FEI X W, LI K L, YANG W D, et al. Implementation and exploring of acceleration efficiency of parallel AES algorithm on CUDA [J]. Computer Science, 2015, 42(1): 59-62.
|
10 |
ABDELRAHMAN A A, FOUAD M M, DAHSHAN H, et al. High performance CUDA AES implementation: a quantitative performance analysis approach [C]// Proceedings of the 2017 Computing Conference. Piscataway: IEEE, 2017: 1077-1085.
|
11 |
W-Z YEOH, TEH J S, CHEN J. Automated search for block cipher differentials: a GPU-accelerated branch-and-bound algorithm [C]// Proceedings of the 25th Australasian Conference on Information Security and Privacy. Cham: Springer, 2020: 160-179.
|
12 |
LI P, ZHOU S, CHEN J. A CPU-GPU-based parallel search algorithm for the best differential characteristics of block ciphers[J]. The Journal of Supercomputing, 2021, 77: 11460-11480.
|
13 |
W-Z YEOH, TEH J S, CHEN J. Automated enumeration of block cipher differentials: an optimized branch-and-bound GPU framework [J]. Journal of Information Security and Applications, 2022, 65: 103087.
|
14 |
蔡婧雯, 韦永壮, 刘争红. 基于GPU的密码S盒代数性质评估方法[J]. 计算机应用, 2022, 42(9): 2750-2756.
|
|
CAI J W, WEI Y Z, LIU Z H. GPU-based method for evaluating algebraic properties of cryptographic S-boxes [J]. Journal of Computer Applications, 2022, 42(9): 2750-2756.
|
15 |
刘彦宾, 谢海英. 最大差分和线性概率的计算方法[J]. 通信技术, 2009, 42(7): 110-112.
|
|
LIU Y B, XIE H Y. A method for computing maximum probability of differential characteristic and linear approximation [J]. Communications Technology, 2009, 42(7): 110-112.
|
16 |
NYBERG K. Differentially uniform mappings for cryptography[C]// Proceedings of the 1993 Workshop on the Theory and Application of Cryptographic Techniques. Berlin: Springer, 1993: 55-64.
|
17 |
徐洪, 段明, 谭林, 等. NBC算法[J]. 密码学报, 2019,6(6): 760-767.
|
|
XU H, DUAN M, TAN L, et al. On the NBC algorithm[J]. Journal of Cryptologic Research, 2019, 6(6): 760-767.
|
18 |
田甜, 戚文峰, 叶晨东, 等. 基于NFSR的分组密码算法SPRING [J]. 密码学报, 2019, 6(6): 815-834.
|
|
TIAN T, QI W F, YE C D, et al. SPRING: a family of small hardware-oriented block ciphers based on NFSRs [J]. Journal of Cryptologic Research, 2019, 6(6):815-834.
|