[1] |
Yanjun LI, Yaodong GE, Qi WANG, Weiguo ZHANG, Chen LIU.
Improved KLEIN algorithm and its quantum analysis
[J]. Journal of Computer Applications, 2024, 44(9): 2810-2817.
|
[2] |
Runlian ZHANG, Mi ZHANG, Xiaonian WU, Rui SHU.
Differential property evaluation method based on GPU for large-state cryptographic S-boxes
[J]. Journal of Computer Applications, 2024, 44(9): 2785-2790.
|
[3] |
Yong XIANG, Yanjun LI, Dingyun HUANG, Yu CHEN, Huiqin XIE.
Differential and linear characteristic analysis of full-round Shadow algorithm
[J]. Journal of Computer Applications, 2024, 44(12): 3839-3843.
|
[4] |
Guangyao ZHAO, Xuan SHEN, Bo YU, Chenhui YI, Zhen LI.
Impossible differential cryptanalysis of reduced-round ultra-lightweight block cipher PFP
[J]. Journal of Computer Applications, 2023, 43(9): 2784-2788.
|
[5] |
Dongdong LIN, Manman LI, Shaozhen CHEN.
Conditional differential cryptanalysis method of KATAN48 algorithm based on neural distinguishers
[J]. Journal of Computer Applications, 2023, 43(8): 2462-2470.
|
[6] |
Yipeng SHI, Jie LIU, Jinyuan ZU, Tao ZHANG, Guoqun ZHANG.
Compact constraint analysis of SPONGENT S-box based on mixed integer linear programming model
[J]. Journal of Computer Applications, 2023, 43(5): 1504-1510.
|
[7] |
Jinwei PU, Qingjian GAO, Xin ZHENG, Yinghui XU.
SM4 resistant differential power analysis lightweight threshold implementation
[J]. Journal of Computer Applications, 2023, 43(11): 3490-3496.
|
[8] |
Shanshan HUO, Yanjun LI, Jian LIU, Yinshuang LI.
Design and implementation of cipher component security criteria testing tool
[J]. Journal of Computer Applications, 2023, 43(10): 3156-3161.
|
[9] |
Jingwen CAI, Yongzhuang WEI, Zhenghong LIU.
GPU-based method for evaluating algebraic properties of cryptographic S-boxes
[J]. Journal of Computer Applications, 2022, 42(9): 2750-2756.
|
[10] |
Geng ZHAO, Senmin ZHANG, Yingjie MA, Shirui GAO.
Design and analysis of dynamic S-box based on anti-degradation chaotic system
[J]. Journal of Computer Applications, 2022, 42(10): 3069-3073.
|
[11] |
LIU Zongfu, YUAN Zheng, ZHAO Chenxi, ZHU Liang.
Integral attack on PICO algorithm based on division property
[J]. Journal of Computer Applications, 2020, 40(10): 2967-2972.
|
[12] |
ZHAO Ying, YE Tao, WEI Yongzhuang.
New security analysis of several kinds of high-level cryptographical S-boxes
[J]. Journal of Computer Applications, 2017, 37(9): 2572-2575.
|
[13] |
MA Yunfei, WANG Tao, CHEN Hao, HUANG Changyang.
Algebraic fault attack on lightweight block ciphers SIMON
[J]. Journal of Computer Applications, 2017, 37(7): 1953-1959.
|
[14] |
CHENG Lu, WEI Yuechuan, PAN Xiaozhong, LI Anhui.
Multidimensional zero-correlation linear cryptanalysis on Zodiac cipher algorithm
[J]. Journal of Computer Applications, 2017, 37(6): 1605-1608.
|
[15] |
WANG Shoucheng, XU Jinhui, YAN Yingjian, LI Gongli, JIA Yongwang.
Software pipelining realization method of AES algorithm based on cipher stream processor
[J]. Journal of Computer Applications, 2017, 37(6): 1620-1624.
|