[1] 金晨辉,郑浩然,张少武,等.密码学[M].北京:高等教育出版社,2009:110-131.(JIN C H, ZHENG H R, ZHANG S W, et al. Cryptography [M]. Beijing: Higher Education Press, 2009: 110-131.) [2] LU Y, VAUDENAY S. Cryptanalysis of bluetooth keystream generator two-lever E0 [M]// LEE J P. Advances in Cryptology—Asiarcypt 2004, LNCS 3329. Berlin: Springer, 2004:147-158. [3] BATINA L, LANO J, MENTENS N, et.al, Energy, performance, area versus security trade-offs for stream ciphers [EB/OL]. [2016-01-02]. http://xueshu.baidu.com/s?wd=paperuri%3A%28f5e4b24c3cdc6f218dbfff977513bb56%29&filter=sc_long_sign&tn=SE_xueshusource_2kduw22v&sc_vurl=http%3A%2F%2Fciteseerx.ist.psu.edu%2Fviewdoc%2Fdownload%3Bjsessionid%3DFF3F4DFE947080373088C232E0F96C28%3Fdoi%3D10.1.1.87.6629%26rep%3Drep1%26type%3Dpdf&ie=utf-8&sc_us=15751774956421205228. [4] GALANIS M D, KITSOS P, KOSTOPOULOS G, et al. Comparison of the hardware implementation of stream ciphers [J]. The International Arab Journal of Information Technology, 2005, 2(4): 267-274. [5] GVRKAYNAK F K, LUETHI P, BERNOLD N, et al. Hardware evaluation of eSTREAM candidates: Achterbahn, Grain, MICKEY, MOSQUITO, SFINKS, Trivium, VEST, ZK-Crypt [EB/OL]. [2016-01-04]. https://www.cosic.esat.kuleuven.be/ecrypt/stream/papersdir/2006/015.pdf. [6] 刘邦.序列密码非线性运算单元可重构设计技术研究[D].郑州:信息工程大学,2011.(LIU B. Research on reconfigurable design technology for nonlinear computing units of sequence cryptograms [D]. Zhengzhou: Information Engineering University, 2011.) [7] 纪祥君,陈迅,戴紫彬,等.一种改进的非线性布尔函数硬件设计与实现[J].计算机应用与软件,2014,31(7):283-285.(JI X J, CHEN X, DAI Z B, et al. Design and realization of an improved hardware with non-line boolean function [J]. Computer Applications and Software, 2014, 31(7): 283-285.) [8] 纪祥君,宋怀刚,李理,等.非线性布尔函数处理模型研究与设计[J].计算机安全, 2014(8): 8-11. JI X J, SONG H G, LI L, et al. The research and design of a model of non-line boolean function processing [J]. Network and Computer Security, 2014(8): 8-11. [9] ANDERSON J H, WANG Q. Area-efficient FPGA logic elements: architecture and synthesis [C]//ASPDAC '11: Proceedings of the 2011 16th Asia and South Pacific Design Automation Conference. Piscataway, NJ: IEEE, 2011:369-375. [10] 刘运毅,覃团发,倪皖荪,等.简评ECRYPT的候选流密码算法[J].信息安全与通信保密,2006(9):26-28. (LIU Y Y, TAN T F, NI W S, et al. The brief evaluations of the candidates to the ECRYPT stream ciphers [J]. Information Security and Communications Privacy, 2006(9):26-28.) [11] 冯登国.NESSIE工程简介[J].信息安全与通信保密,2001(3):36-39.(FENG D G. Introduction of NESSIE [J]. Information Security and Communications Privacy, 2001(3):36-39.) [12] 刘依依.eSTREAM和流密码分析现状[J].信息安全与通信保密,2009(12):47-49.(LIU Y Y. eSTREAM and the present state of stream-cipher analysis [J]. Information Security and Communications Privacy, 2009(12):47-49.) |