| 1 | BENNETT C H, SHOR P W. Quantum information theory[J]. IEEE Transactions on Information Theory, 1998, 44(6): 2724-2742.  10.1109/18.720553 | 
																													
																							| 2 | National Institute of Standards and Technology. Lightweight cryptography-round-1-candidates[EB/OL]. [2020-08-12]..  10.3390/electronics9111940 | 
																													
																							| 3 | BEIERLE C, BIRYUKOV A, CARDOSO DOS SANTOS L, et al. Lightweight AEAD and hashing using the SPARKLE permutation family[J]. IACR Transactions on Symmetric Cryptology, 2020, 2020(S1): 208-261.  10.46586/tosc.v2020.is1.208-261 | 
																													
																							| 4 | BANIK S, CHAKRABORTI A, IWATA T, et al. GIFT-COFB[EB/OL]. (2020-06-18) [2021-06-12].. | 
																													
																							| 5 | 中国密码学会. 关于举办全国密码算法设计竞赛的通知[EB/OL]. (2018-06-11) [2021-06-12]..  10.17706/jcp.11.2.140-148 | 
																													
																							|  | Chinese Association for Cryptologic Research. Notice on holding a national cryptographic algorithm design competition[EB/OL]. (2018-06-11) [2021-06-12]..  10.17706/jcp.11.2.140-148 | 
																													
																							| 6 | 徐洪,段明,谭林,等. NBC算法[J]. 密码学报, 2019, 6(6): 760-767.  10.13868/j.cnki.jcr.000339 | 
																													
																							|  | XU H, DUAN M, TAN L, et al. On the NBC algorithm[J]. Journal of Cryptologic Research, 2019, 6(6): 760-767.  10.13868/j.cnki.jcr.000339 | 
																													
																							| 7 | 田甜,戚文峰,叶晨东,等. 基于NFSR的分组密码算法SPRING[J]. 密码学报, 2019, 6(6): 815-834.  10.13868/j.cnki.jcr.000343 | 
																													
																							|  | TIAN T, QI W F, YE C D, et al. SPRING: a family of small hardware-oriented block ciphers based on NFSRs[J]. Journal of Cryptologic Research, 2019, 6(6): 815-834.  10.13868/j.cnki.jcr.000343 | 
																													
																							| 8 | BEIERLE C, CARDOSO DOS SANTOS L, et al. Alzette: a 64-bit ARX-box (feat. CRAX and TRAX)[C]// Proceedings of the 2020 Annual International Cryptology Conference, LNCS 12172 . Cham: Springer, 2020: 419-448. | 
																													
																							| 9 | CANTEAUT A, DUVAL S, LEURENT G. Construction of lightweight S-boxes using Feistel and MISTY structures[C]// Proceedings of the 2015 International Conference on Selected Areas in Cryptography, LNCS 9566. Cham: Springer, 2016: 373-393. | 
																													
																							| 10 | GHOSHAL A, SADHUKHAN R, PATRANABIS S, et al. Lightweight and side-channel secure 4×4 S-boxes from cellular automata rules[J]. IACR Transactions on Symmetric Cryptology, 2018, 2018(3): 311-334.  10.46586/tosc.v2018.i3.311-334 | 
																													
																							| 11 | PICEK S, MARIOT L, YANG B H, et al. Design of S-boxes defined with cellular automata rules[C]// Proceedings of the 2017 ACM International Conference on Computing Frontiers. New York: ACM, 2017: 409-414.  10.1145/3075564.3079069 | 
																													
																							| 12 | LI H Z, ZHOU Y B, MING J D, et al. The notion of transparency order, revisited[J]. The Computer Journal, 2020, 63(12): 1915-1938.  10.1093/comjnl/bxaa069 | 
																													
																							| 13 | MARIOT L, PICEK S, LEPORATI A, et al. Cellular automata-based S-boxes[J]. Cryptography and Communications, 2019, 11(1): 41-62.  10.1007/s12095-018-0311-8 | 
																													
																							| 14 | BIHAM E, SHAMIR A. Differential cryptanalysis of DES-like cryptosystems[J]. Journal of Cryptology, 1991, 4(1): 3-72.  10.1007/bf00630563 | 
																													
																							| 15 | MATSUI M. Linear cryptanalysis method for DES cipher[C]// Proceedings of the 1993 Workshop on the Theory and Application of Cryptographic Techniques, LNCS 765. Berlin: Springer, 1994: 386-397. | 
																													
																							| 16 | KOCHER P, JAFFE J, JUN B. Differential power analysis[C]// Proceedings of the 1999 Annual International Cryptology Conference, LNCS 1666. Berlin: Springer, 1999: 388-397. | 
																													
																							| 17 | KEDEM G, ISHIHARA Y. Brute force attack on UNIX passwords with SIMD computer[C]// Proceedings of the 8th USENIX Security Symposium. Berkeley: USENIX Association, 1999: 93-98. | 
																													
																							| 18 | MANAVSKI S A. CUDA compatible GPU as an efficient hardware accelerator for AES cryptography[C]// Proceedings of the 2007 IEEE International Conference on Signal Processing and Communications. Piscataway: IEEE, 2007: 65-68.  10.1109/icspc.2007.4728256 | 
																													
																							| 19 | CHEONG H S, LEE W K. Fast implementation of block ciphers and PRNGs for Kepler GPU architecture[C]// Proceedings of the 5th International Conference on IT Convergence and Security. Piscataway: IEEE, 2015: 1-5.  10.1109/icitcs.2015.7292982 | 
																													
																							| 20 | YEOH W Z, TEH J S, CHEN J G. Automated search for block cipher differentials: a GPU-accelerated branch-and-bound algorithm[C]// Proceedings of the 2020 Australasian Conference on Information Security and Privacy, LNCS 12248. Cham: Springer, 2020: 160-179. | 
																													
																							| 21 | 李超,孙兵,李瑞林. 分组密码的攻击方法与实例分析[M]. 北京:科学出版社, 2010:72-73, 98-100. | 
																													
																							|  | LI C, SUN B, LI R L. Attack Method and Case Analysis of Block Cipher[M]. Beijing: Science Press, 2010: 72-73, 98-100. |