Wang Nian-ping and Jin Chen-hui. Security evaluation against differential and linear cryptanalyses for Feistel ciphers. Frontiers of Computer Science in China, 2009, 3(12): 494-502.[2] Youssef A, Mister S, and Tavares S. On the design of linear transformations for substitution permutation encryption networks. Workshop on Selected Areas in Cryptography- SAC97, Ottawa, Workshop record, 1997: 40-48.[3] Kang Ju-sung, Hong Seo-khie, and Lee Sang-jin, et al..Practical and provable security against differential and linear cryptanalysis for substitution-permutation networks. ETRI Journal, 2001, 23(4): 158-167.[4] 北京大学数学系几何与代数教研室代数小组. 高等代数(第2版). 北京: 高等教育出版社, 1988: 296-298.[5] 金晨辉, 郑浩然, 张少武等.密码学.北京:高等教育出版社,2009,11:175-176.[6] Kwon Daesung, Kim Jaesung, and Park Sangwoo, et al.. New block cipher: ARIA. ICISC 2003, 2004, LNCS 2971: 432-445.[7] Xiao L and Heys H M. Hardware design and analysis of block cipher components. Proceedings of the 5th International Conference on Information Security and Cryptology- ICISC02. 2003, LNCS 2587: 164-181.[8] Biryukov A and Nikoli? I. Automatic search for related-key differential characteristics in byte-oriented block ciphers: application to AES, Camellia, Khazad and Others. EUROCRYPT 2010. 2010, LNCS 6110: 322-344.[9] Biryukov A and Khovratovich D. Related-key cryptanalysis of the full AES-192 and AES-256. ASIACRYPT 2009. 2009, LNCS 5912: 1-18.[10] 王念平, 金晨辉, 余昭平. 对合型列混合变换的研究. 电子学报, 2005, 33(10): 1917-1920.Wang N P, Jin C H, and Yu Z P. Research on involution-typed mixcolumn transform. Acta Electronica Sinica, 2005, 33(10): 1917-1920.
|