| Citation: | XU Hong, SU Penghui, QI Wenfeng. Impossible Differential Cryptanalysis of Reduced-round SPECK[J]. Journal of Electronics & Information Technology, 2017, 39(10): 2479-2486. doi: 10.11999/JEIT170049 | 
 
	                | KNUDSEN L. DEALA 128-bit block cipher[R]. Department of Informatics, University of Bergen, Norway, 1998. | 
| BIHAM E, BIRYUKOV A, and SHAMIR A. Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials [J]. Lecture Notes in Computer Science, 1999, 1592: 12-23. doi:  10.1007/3-540-48910-X_2. | 
| LU J, KELLER N, and KIM J. New impossible differential attacks on AES[J]. Lecture Notes in Computer Science, 2008, 5365: 279-293. doi:  10.1007/978-3-540-89754-5_22. | 
| ZHANG Wentao, WU Wenling, and FENG Dengguo. New results on impossible differential cryptanalysis of reduced AES[J]. Lecture Notes in Computer Science, 2007, 4817: 239-250. doi:  10.1007/978-3-540-76788-6_19. | 
| LU J, KIM J, and KELLER N. Improving the efficiency of impossible differential cryptanalysis of reduced Camellia and MISTY1[J]. Lecture Notes in Computer Science, 2008, 4964: 370-386. doi:  10.1007/978-3-540-79263-5_24. | 
| WU Wenling, ZHANG Wentao, and FENG Dengguo. | 
| Impossible differential cryptanalysis of reduced-round ARIA and Camellia[J]. Journal of Computer Science and Technology, 2007, 22(3): 449-456. doi:  10.1007/s11390-007-9056-0. | 
| ABED F, LIST E, and LUCKS S. Differential cryptanalysis of round-reduced SIMON and SPECK[J]. Lecture Notes in Computer Science, 2014, 8540: 525-545. doi: 10.1007/978-3- 662-46706-0_27. | 
| BIRYUKOV A, ROY A, and VELICHKOV V. Differential analysis of block ciphers SIMON and SPECK[J]. Lecture Notes in Computer Science, 2014, 8540: 546-570. doi: 10.1007 /978-3-662-46706-0_28. | 
| DINUR I. Improved differential cryptanalysis of round- reduced SPECK[J]. Lecture Notes in Computer Science, 2014, 8781: 147-164. doi:  10.1007/978-3-319-13051-4_9. | 
| BIRYUKOV A, VELICHKOV V, and LE Y. Automatic | 
| search for the best trails in ARX: Application to Block Cipher SPECK[J]. Lecture Notes in Computer Science, 2016, 9783: 289-310. doi:  10.1007/978-3-662-52993-5_15. | 
| FU Kai, WANG Meiqin, and GUO Y. MILP-based automatic search algorithms for differential and linear trails for SPECK [J]. Lecture Notes in Computer Science, 2016, 9783: 268-288. doi:  10.1007/978-3-662-52993-5_14. | 
| YAO Yuan, ZHANG Bin, and WU Wenling. Automatic search for linear trails of the SPECK family[J]. Lecture Notes in Computer Science, 2015, 9290: 158-176. doi: 10.1007/ 978-3-319-23318-5_9. | 
| 程雨芊. 对SPECK系列分组密码算法的零相关线性分析 [D]. [硕士论文], 山东大学, 2015. | 
| CHENG Yuqian. Zero correlation cryptanalysis of block cipher speck[D]. [Master dissertation], Shandong University, 2015. | 
