| 1 | KRISHNAMURTHY G N, RAMASWAMY V, LEELA G H, et al. Blow-CAST-Fish: a new 64-bit block cipher[J]. International Journal of Computer Science and Network Security, 2008, 8(4):282-290. | 
																													
																							| 2 | SCHNEIER B. Description of a new variable-length key, 64-bit block cipher (Blowfish)[C]// Proceedings of the 1993 International Conference on Fast Software Encryption, LNCS 809. Berlin: Springer, 1994:191-204. | 
																													
																							| 3 | ADAMS C. RFC 2144: the CAST-128 encryption algorithm[EB/OL]. [2021-03-21].. | 
																													
																							| 4 | VAUDENAY S. On the weak keys of Blowfish[C]// Proceedings of the 1996 International Conference on Fast Software Encryption, LNCS 1039. Berlin: Springer, 1996: 27-32. | 
																													
																							| 5 | WANG M Q, WANG X Y, CHOW K P, et al. New differential cryptanalysis results for reduced round CAST-128[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2010, E93-A(12):2744-2754.  10.1587/transfun.e93.a.2744 | 
																													
																							| 6 | 孙晓玲,王美琴,李忠,等. 低轮Blow-CAST-Fish算法的差分攻击[J]. 计算机工程, 2012, 38(12):99-101.  10.3969/j.issn.1000-3428.2012.12.029 | 
																													
																							|  | SUN X L, WANG M Q, LI Z, et al. Differential attack on reduced-round Blow-CAST-Fish algorithm[J]. Computer Engineering, 2012, 38(12):99-101.  10.3969/j.issn.1000-3428.2012.12.029 | 
																													
																							| 7 | 孙晓玲,王美琴,孙旭光,等. 16轮Blow-CAST-Fish的弱密钥攻击[J]. 计算机工程与应用, 2011,47(35):110-112.  10.3778/j.issn.1002-8331.2011.35.031 | 
																													
																							|  | SUN X L, WANG M Q, SUN X G, et al. Weak-key attack on 16-round Blow-CAST-Fish[J]. Computer Engineering and Applications, 2011, 47(35): 110-112.  10.3778/j.issn.1002-8331.2011.35.031 | 
																													
																							| 8 | WANG S M, CUI T T, WANG M Q. Improved differential cryptanalysis of CAST-128 and CAST-256[C]// Proceedings of the 2016 International Conference on Information Security and Cryptology, LNCS 10143. Cham: Springer, 2017:18-32. | 
																													
																							| 9 | SEKI H, KANEKO T. Differential cryptanalysis of CAST-256 reduced to nine quad-rounds[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2001, E84-A(4):913-918.  10.1007/3-540-44983-3_23 | 
																													
																							| 10 | CUI T T, CHEN H F, WEN L, et al. Statistical integral attack on CAST-256 and IDEA[J]. Cryptography and Communication, 2018, 10(1): 195-209.  10.1007/s12095-017-0245-6 | 
																													
																							| 11 | 郑向前,张文英,肖祯,等. 缩减轮数的CAST-256积分分析[J]. 计算机应用研究, 2017, 34(1): 221-223.  10.3969/j.issn.1001-3695.2017.01.050 | 
																													
																							|  | ZHENG X Q, ZHANG W Y, XIAO Z, et al. Integral cryptanalytic on reduced-round of CAST-256[J]. Application Research of Computers, 2017, 34(1): 221-223.  10.3969/j.issn.1001-3695.2017.01.050 | 
																													
																							| 12 | 倪博煜,董晓阳. 改进的Type-1型广义Feistel结构的量子攻击及其在分组密码CAST-256上的应用[J]. 电子与信息学报, 2020, 42(2): 295-306.  10.11999/JEIT190633 | 
																													
																							|  | NI B Y, DONG X Y. Improved quantum attack on Type-1 generalized Feistel scheme and its application to CAST-256[J]. Journal of Electronics and Information Technology, 2020, 42(2): 295-306.  10.11999/JEIT190633 | 
																													
																							| 13 | WANG M Q, CUI T T, CHEN H F, et al. Integrals go statistical: cryptanalysis of full skipjack variants[C]// Proceedings of the 2016 International Conference on Fast Software Encryption, LNCS 9783. Berlin: Springer, 2016: 399-415. | 
																													
																							| 14 | ZONG R, DONG X Y, WANG X Y. Related-tweakey impossible differential attack on reduced-round Deoxys-BC-256[J]. SCIENCE CHINA Information Sciences, 2019, 62(3): No.32102.  10.1007/s11432-017-9382-2 | 
																													
																							| 15 | GUO H, SUN S W, SHI D P, et al. Differential attacks on CRAFT exploiting the involutory S-boxes and tweak additions[J]. IACR Transactions on Symmetric Cryptology, 2020, 2020(3):119-151.  10.46586/tosc.v2020.i3.119-151 | 
																													
																							| 16 | ITO G, HOSOYAMADA A, MATSUMOTO R, et al. Quantum chosen-ciphertext attacks against Feistel ciphers[C]// Proceedings of the 2019 Cryptographers’ Track at the RSA Conference, LNCS 11405. Cham: Springer, 2019: 391-411. | 
																													
																							| 17 | HOSOYAMADA A, SASAKI Y. Quantum Demiric-Selçuk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions[C]// Proceedings of the 2018 International Conference on Security and Cryptography for Networks, LNCS 11035. Cham: Springer, 2018:386-403. | 
																													
																							| 18 | DONG X Y, WANG X Y. Quantum key recovery attack on Feistel structures[J]. Science China Information Sciences, 2018, 61(10): No.102501.  10.1007/s11432-017-9468-y | 
																													
																							| 19 | DONG X Y, LI Z, WANG X Y. Quantum cryptanalysis on some generalized Feistel schemes[J]. SCIENCE CHINA Information Sciences, 2019, 62(2): No.22501.  10.1007/s11432-017-9436-7 |