U.S. Department of Commerce and National Institute of Standards and Technology. FIPS PUB 46-3[S]. 1999.
|
WU Wenling and ZHANG Lei. LBlock: a lightweight block cipher[C]. 9th International Conference on Applied Cryptography and Network Security-ACNS 2011, Nerja, Spain, 2011: 327-344. doi: 10.1007/978-3-642-21554-4_19.
|
BOGDANOV A and SHIBUTANI K. Double SP-functions: enhanced generalized Feistel networks[C]. 16th Australasian Conference on Information Security and Privacy-ACISP 2011, Melbourne, Australia, 2011: 106-119. doi: 10.1007/978-3-642- 22497-3_8.
|
SHIBUTANI K, ISOBE T, HIWATARI H, et al. Piccolo: an ultra-lightweight blockcipher[C]. 13th International Workshop on Cryptographic Hardware and Embedded Systems-CHES 2011, Nara, Japan, 2011: 342-357. doi: 10.1007/978-3-642-23951-9_23.
|
KNUDSEN L R and RIJMEN V. Known-key distinguishers for some block ciphers[C]. 13th International Conference on the Theory and Application of Cryptology and Information Security-ASIACRYPT 2007, Kuching, Malaysia, 2007: 315-324. doi: 10.1007/978-3-540-76900-2_19.
|
BLONDEAU C, PEYRIN T, and WANG L. Known-key distinguisher on full PRESENT[C]. 35th Annual Cryptology Conference on Advances in Cryptology-CRYPTO 2015, Santa Barbara, USA, 2015: 455-474. doi: 10.1007/978-3-662- 47989-6_22.
|
ANDREEVA E, BOGDANOV A, and MENNINK B. Towards understanding the known-key security of block ciphers[C]. 20th International Workshop on Fast Software Encryption-FSE 2013, Singapore, 2013: 348-366. doi: 10.1007 /978-3-662-43933-3_18.
|
ZHA Daren, WU Shuang, and WANG Qiongxiao. Improved known-key distinguisher on round-reduced 3D block cipher[J]. Chinese Journal of Electronics, 2015, 24(1): 199-204. doi: 10.1049/cje.2015.01.033.
|
AOKI K. A property for full CLEFIA-128 detected by a middletext distinguisher under the known-key setting[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2014, 97(1): 292-297. doi: 10.1587/transfun.E97.A.292.
|
SASAKI Y and YASUDA K. Known-key distinguishers on 11-round Feistel and collision attacks on its hashing modes[C]. 18th International Workshop on Fast Software Encryption- FSE 2011, Lyngby, Denmark, 2011: 397-415. doi: 10.1007/ 978-3-642-21702-9_23.
|
HYUNGCHUL K, DEUKJO H, DUKJAE M, et al. Known-key attacks on generalized Feistel schemes with SP round function[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2012, 95(9): 1550-1560. doi: 10.1587/transfun.E95.A.1550.
|
DONG Le, WU Wenling, WU Shuang, et al. Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes[J]. Frontiers of Computer Science, 2014, 8(3): 513-525. doi: 10.1007/s11704-014-2412-7.
|
DONG Le, WANG Yanling, WU Wenling, et al. Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitutionpermutation functions and near-collision attacks on its hashing modes[J]. IET Information Security, 2015, 9(5): 277-283. doi: 10.1049/ iet-ifs.2014.0402.
|
SASAKI Y. Double-sp is weaker than single-sp: rebound attacks on Feistel ciphers with several rounds[C]. 13th International Conference on Progress in Cryptology- INDOCRYPT 2012, Kolkata, India, 2012: 265-282. doi: 10.1007/978-3-642-34931-7_16.
|
MENDEL F, RECHBERGER C, SCHLFFER M, et al. The rebound attack: cryptanalysis of reduced Whirlpool and Grstl[C]. 16th International Workshop on Fast Software Encryption-FSE 2009, Leuven, Belgium, 2009: 260-276. doi: 10.1007/978-3-642-03317-9_16.
|
SASAKI Y, LI Y, WANG L, et al. Non-full-active Super-Sbox analysis: applications to ECHO and Grstl[C]. 16th International Conference on Advances in Cryptology- ASIACRYPT 2010, Singapore, 2010: 38-55. doi: 10.1007/ 978-3-642-17373-8_3.
|