1 |
SINGH P, ACHARYA B, CHAURASIYA R K. Lightweight cryptographic algorithms for resource-constrained IoT devices and sensor networks [M]// SHARMA S K, BHUSHAN B, DEBNATH N C. Security and privacy issues in IoT devices and sensor networks: a volume in advances in ubiquitous sensing applications for healthcare. New York: Academic Press, 2021: 153-185.
|
2 |
WU W, ZHANG L. LBlock: a lightweight block cipher[C]// Proceedings of the 2011 International Conference on Applied Cryptography and Network Security, LNCS 6715. Berlin: Springer, 2011: 327-344.
|
3 |
BOGDANOV A, KNUDSEN L R, LEANDER G, et al. PRESENT: an ultra-lightweight block cipher [C]// Proceedings of the 2007 International Workshop on Cryptographic Hardware and Embedded Systems, LNCS 4727. Berlin: Springer, 2007: 450-466.
|
4 |
GONG Z, NIKOVA S, LAW Y W. KLEIN: a new family of lightweight block ciphers [C]// Proceedings of the 2011 International Workshop on Radio Frequency Identification: Security and Privacy Issues. Berlin: Springer, 2012: 1-18.
|
5 |
BANIK S, BOGDANOV A, ISOBE T, et al. Midori: a block cipher for low energy[C]// Proceedings of the 2015 International Conference on the Theory and Application of Cryptology and Information Security, LNCS 9453. Berlin: Springer, 2015: 411-436.
|
6 |
GUO J, PEYRIN T, POSCHMANN A, et al. The LED block cipher[C]// Proceedings of the 2011 International Workshop on Cryptographic Hardware and Embedded Systems, LNCS 6917. Berlin: Springer, 2011: 326-341.
|
7 |
OJHA S K, KUMAR N, JAIN K, et al. TWIS — a lightweight block cipher [C]// Proceedings of the 2009 International Conference on Information Systems Security, LNCS 5905. Berlin: Springer, 2009:280-291.
|
8 |
HONG D, LEE J K, KIM D C, et al. LEA: a 128-bit block cipher for fast encryption on common processors [C]// Proceedings of the 2013 International Workshop on Information Security Applications, LNCS 8267. Cham: Springer, 2014: 3-27.
|
9 |
BANSOD G, PISHAROTY N, PATIL A. PICO: an ultra lightweight and low power encryption design for ubiquitous computing [J]. Defence Science Journal, 2016, 66(3): 259-265.
|
10 |
GUO Y, LI L, LIU B. Shadow: a lightweight block cipher for IoT nodes [J]. IEEE Internet of Things Journal, 2021, 8(16): 13014-13023.
|
11 |
SU B, WU W, ZHANG L, et al. Full-round differential attack on TWIS block cipher[C]// Proceedings of the 2010 International Workshop on Information Security Applications, LNCS 6513. Berlin: Springer, 2011: 234-242.
|
12 |
BLONDEAU C, PEYRIN T, WANG L. Known-key distinguisher on full PRESENT[C]// Proceedings of the 2015 Annual International Cryptology Conference, LNCS 9215. Berlin: Springer, 2015: 455-474.
|
13 |
TODO Y. Integral cryptanalysis on full MISTY1[J]. Journal of Cryptology, 2017, 30(3): 920-959.
|
14 |
LALLEMAND V, NAYA-PLASENCIA M. Cryptanalysis of KLEIN[C]// Proceedings of the 2014 International Workshop on Fast Software Encryption, LNCS 8540. Berlin: Springer, 2015: 451-470.
|
15 |
王彩冰,张志宇,胡磊. 对轻量级分组密码 PICO 算法的差分攻击[J].密码学报, 2023, 10(4):685-701.
|
|
WANG C B, ZHANG Z Y, HU L. Differential cryptanalysis on ultra lightweight block cipher PICO [J]. Journal of Cryptologic Research, 2023, 10(4): 685-701.
|
16 |
GUO J, JEAN J, NIKOLIC I, et al. Invariant subspace attack against Midori 64 and the resistance criteria for S-box designs [J]. IACR Transactions on Symmetric Cryptology, 2016, 2016(1): 33-56.
|
17 |
KIM S, SHIN M, KIM S, et al. Shining light on the Shadow: full-round practical distinguisher for lightweight block cipher Shadow[EB/OL]. [2023-08-08]..
|
18 |
LI Y, LIN H, BI X, et al. MILP-based differential cryptanalysis on full-round Shadow[J]. Journal of Information Security and Applications, 2024, 81: No.103696.
|
19 |
BIHAM E, SHAMIR A. Differential cryptanalysis of DES-like cryptosystems [J]. Journal of Cryptology, 1991, 4: 3-72.
|
20 |
MATSUI M. The first experimental cryptanalysis of the Data Encryption Standard[C]// Proceedings of the 1994 Annual International Cryptology Conference, LNCS 839. Berlin: Springer, 1994: 1-11.
|
21 |
BARDET M, FAUGÈRE J C, SALVY B, et al. On the complexity of solving quadratic Boolean systems[J]. Journal of Complex, 2013, 29(1): 53-75.
|