Citation: | LI Yunqiang, ZHANG Xiaoyong, WANG Ailan. Distribution Characteristics of the AES-128 Biclique Structure[J]. Journal of Electronics & Information Technology, 2016, 38(1): 135-140. doi: 10.11999/JEIT150597 |
DAEMEN J and RIJMEN V. The design of Rijndael: AES- the advanced encryption standard[S]. Springer-Verlag, 2002.
|
NIELS F, JOHN K, STEFAN L, et al. Improved cryptanalysis of Rijndael[J]. LNCS, 2000, 1978: 213-230.
|
HENRI G and MARINE M. A collision attack on 7 rounds of Rijndael[C]. Third AES Candidate Conference, New York, USA, 2000: 230-241.
|
HAMID M, MOHAMMAD D, RIJMEN V, et al. Improved impossible differential cryptanalysis of 7-round AES-128[J]. LNCS, 2010, 6498: 282291.
|
DUNKELMAN O, KELLER N, and SHAMIR A. Improved single-key attacks on 8-round AES-192 and AES-256[J]. LNCS, 2010, 6477: 158-176.
|
DMITRY K, CHRISTIAN R, and ALEXANDRA S. Bicliques for preimages: attacks on Skein-512 and the SHA-2 family[C]. 19th International Workshop on Fast Software Encryption, Washington DC, USA, 2012: 244-263.
|
WANG Yanfeng, WU Wenling, and YU Xiaoli. Biclique cryptanalysis of reduced-round piccolo block cipher[J]. LNCS, 2012, 7232: 337-352.
|
ANDREY B, DMITRY K, and CHRISTIAN R. Biclique cryptanalysis of the full AES[C]. ASIACRYPT11, Seoul, Korea, 2011: 344-371.
|
徐田敏. 分组密码AES和ARIA算法的Biclique分析[D]. [硕士论文], 信息工程大学, 2013.
|
XU Tianmin. Biclique cryptanalysis of AES and ARIA block cipher[D]. [Master dissertation]. Information Engineering University, 2013.
|
谢作敏, 陈少真, 鲁林真. 11轮3D密码的不可能差分攻击[J]. 电子与信息学报, 2014, 36(5): 1215-1220. doi: 10.3724/SP.J. 1146.2013.00948.
|
XIE Zuomin, CHEN Shaozhen, and LU Linzhen. Impossible differential cryptanalysis of 11-round 3D cipher[J]. Journal of Electronics Information Technology, 2014, 36(5): 1215-1220. doi: 10.3724/SP.J.1146.2013.00948.
|
罗伟, 郭建胜. Eagle-128算法的相关密钥-矩形攻击[J]. 电子与信息学报, 2014, 36(6): 1520-1524. doi: 10.3724/SP.J. 1146.2013.01239.
|
LUO Wei and GUO Jiansheng. Related-key rectangle attack on Eagle-128 algorithm[J]. Journal of Electronics Information Technology, 2014, 36(6): 1520-1524. doi: 10.3724 /SP.J.1146.2013.01239.
|
沈璇, 李瑞林, 李超, 等. SHACAL-2算法中非线性函数的差分特性及其应用[J]. 电子与信息学报, 2014, 36(7): 1661-1666. doi: 10.3724/SP.J. 1146.2013.01717.
|
SHEN Xuan, LI Ruilin, LI Chao, et al. Differential analysis of the nonlinear functions of SHACAL-2 algorithm and the application[J]. Journal of Electronics Information Technology, 2014, 36(7): 1661-1666. doi: 10.3724/SP.J.1146. 2013.01717.
|
郭瑞, 金晨辉. 低轮FOX64算法的零相关-积分分析[J]. 电子与信息学报, 2015, 37(2): 417-422. doi: 10.11999/ JEIT140373.
|
GUO Rui and JIN Chenhui. Integral cryptanalysis of reduced round FOX64[J]. Journal of Electronics Information Technology, 2015, 37(2): 417-422. doi: 10.11999/ JEIT140373.
|