[1] Biham E, Biryukov A, and Shamir A. Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials[C]. EUROCRYPT 1999, LNCS 1592: 12-23. [2] Zhang Wen-tao, Wu Wen-ling, and Zhang Lei, et al.. Improved related-key impossible differential attacks on reduced-round AES-192[C]. Proceedings of Selected Areas in Cryptography 2006, LNCS 4356: 15-27. [3] Wu Wen-ling, Zhang Wen-tao, and Feng Deng-guo. Impossible differential cryptanalysis of reduce round ARIA and Camellia[J].Journal of Computer Science and Technology.2007, 22(3):449-456 [4] Tsunoo Y, Tsujihara E, and Shigeri M, et al.. Impossible differential cryptanalysis of CLEFIA. FSE2008, LNCS 5086: 398-411. [5] Sun Bing, Li Rui-lin, and Wang Mian, et al.. Impossible differential cryptanalysis of CLEFIA. Cryptology ePrint Archive, Report, 2008: 151. [6] Wang Wei and Wang Xiao-yun. Improved impossible differential cryptanalysis of CLEFIA. Cryptology ePrint Archive, Report, 2007: 466. [7] Wu Wen-ling, Zhang Lei, and Zhang Li-ting, et al.. Security analysis of the GF-NLFSR structure and four-cell Block Cipher[C]. ICICS 2009, LNCS 5927: 17-31. [8] Li Rui-lin, Sun Bing, and Li Chao. Distinguishing attacks on a kind of generalized unbalanced feistel network. Cryptology ePrint Archive, Report, 2009: 360. [9] Zheng Y, Matsumoto T, and Imai H. On the construction of block ciphers provably secure and not relying on any unproved hypotheses[C]. CRYPTO 1989, LNCS 435: 461-480. [10] Shirai T and Preneel B. On Feistel ciphers using optimal diffusion mappings across multiple rounds[C]. ASIACRYPT 2004, LNCS 3329: 1-15. [11] Shirai T and Shibutani K. On Feistel structures using a diffusion switching mechanism[C]. FSE 2006, LNCS 4047: 41-56. [12] Shirai T, Shibutani K, and Akishita T, et al.. The 128-bit blockcipher CLEFIA[C]. FSE 2007, LNCS 3017: 181-195.
|