LAI Xuejia and MASSEY J. A proposal for a new block encryption standard. In: Advances in Cryptology[J]. LNCS, 1990, 473: 389–404 doi: 10.1007/3-540-46877-3_35
|
VAUDENAY S. On the Lai-Massey scheme[J]. LNCS, 1999, 1716: 8–19 doi: 10.1007/978-3-540-48000-6_2
|
JUNOD P and VAUDENAY S. FOX: A new family of block ciphers[C]. LNCS, 2004, 259: 131–146. doi: 10.1007/978-3-540-30564-4_8.
|
WU Wenling, ZHANG Wentao, and FENG Dengguo. Improved integral cryptanalysis of reduced FOX block cipher[C]. LNCS, 2005, 3935: 229–241.
|
WU Zhongming, LAI Xuejia, ZHU Bo, et al. Impossible differential cryptanalysis of FOX[J]. LNCS, 2010, 6163: 236–249 doi: 10.1007/978-3-642-14597-1_15
|
魏悦川, 孙兵, 李超. FOX 密码的不可能差分分析[J]. 通信学报, 2010, 31(9): 24–29WEI Yuechuan, SUN Bing, and LI Chao. Impossible differential attacks on FOX[J].Journal on Communications, 2010, 31(9): 24–29
|
吴文玲, 卫宏儒. 低轮 FOX 分组密码的碰撞-积分攻击[J]. 电子学报, 2005, 33(7): 1307–1310WU Wenling and WEI Hongru. Collision-integral attack of reduced-round FOX[J]. Acta Electronica Sinica, 2005, 33(7): 1307–1310
|
郭瑞, 金晨辉. 低轮FOX64算法的零相关-积分分析[J]. 电子与信息学报, 2015, 37(2): 418–422 doi: 10.11999/JEIT140373GUO Rui and JIN Chenhui. Zero correlation-Integral attack of reduced-round FOX[J]. Journal of Electronics&Information Technology, 2015, 37(2): 418–422 doi: 10.11999/JEIT140373
|
LI Ruilin, YOU Jianxiong, SUN Bing, et al. Fault analysis study of the block cipher FOX64[J]. Multimedia Tools and Applications, 2013, 63(3): 691–708 doi: 10.1007/s11042-011-0895-x
|
LUO Yiyuan, LAI Xuejia, and GONG Zheng. Pseudorandomness analysis of the (extended) Lai-Massey scheme[J]. Information Processing Letters, 2010, 111(2): 90–96 doi: 10.1016/j.ipl.2010.10.012
|
YUN A, PARK J H, and LEE J. On Lai-Massey and quasi-Feistel ciphers[J]. Design Codes and Cryptography, 2011, 58: 45–72 doi: 10.1007/s10623-010-9386-8
|
郭瑞, 金晨辉. Lai-Massey结构伪随机特性研究[J]. 电子与信息学报, 2014, 36(4): 828–833 doi: 10.3724/SP.J.1146.2013.00870GUO Rui and JIN Chenhui. On the pseudorandomness of the Lai-Massey scheme[J]. Journal of Electronics&Information Technology, 2014, 36(4): 828–833 doi: 10.3724/SP.J.1146.2013.00870
|
AOKI K and OHTA K. Strict evaluation of the maximum average of differential probability and the maximum average of linear probability[J]. IEICE Transactions Fundamentals, 1997, E80-A(1): 2–8.
|
NYBERG L and KNUDSEN L R. Provable security against a differential attack[J].Journal of Cryptology, 1995, 8: 27–37 doi: 10.1007/BF00204800
|
付立仕, 金晨辉. 基于仿射非正型s变换的Lai-Massey模型的密码学缺陷[J]. 电子与信息学报, 2013, 35(10): 2536–2540 doi: 10.3724/SP.J.1146.2012.01574FU Lishi and JIN Chenhui. The cryptographic weakness of Lai-Massey scheme with an affine but not orthomorphic bijection s[J]. Journal of Electronics&Information Technology, 2013, 35(10): 2536–2540 doi: 10.3724/SP.J.1146.2012.01574
|
付立仕, 金晨辉. Lai-Massey 模型的差分和线性可证明安全性[J]. 软件学报, 2013, 24(Suppl.2): 207–215FU Lishi and JIN Chenhui. Differential and linear provable security of Lai-Massey scheme[J]. Journal of Software, 2013, 24(Suppl.2): 207–215
|
金晨辉, 郑浩然, 张少武, 等. 密码学[M]. 北京: 高等教育出版社, 2009: 175–198.JIN Chenhui, ZHENG Haoran, ZHANG Shaowu, et al. Cryptology[M]. Beijing: Higher Education Press, 2009: 175–198.
|