[1] |
BERNSTEIN D J, KOELBL S, LUCKS S, et al. Gimli: A Cross-Platform Permutation[C]//Lecture Notes in Computer Science:10529. Heidelberg: Springer Verlag, 2017:299-320.
|
[2] |
BERNSTEIN D J, KOELBL S, LUCKS S, et al. Gimli[R/OL].[2021-09-20]. https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/round-2/submissions-rnd2/gimli.zip .
|
[3] |
HAMBURG M. Cryptanalysis of 22 1/2 Rounds of Gimli[R/OL].[2021-09-20]. http://eprint.iacr.org/2017/743 .
|
[4] |
LIU F, ISOBE T, MEIER W. Automatic Verification of Differential Characteristics: Application to Reduced Gimli[C]//Lecture Notes in Computer Science:12172. Heidelberg: Springer Verlag, 2020:219-248.
|
[5] |
LIU F, ISOBE T, MEIER W. Exploiting Weak Diffusion of Gimli:Improved Distinguishers and Preimage Attacks[J]. IACR Transactions on Symmetric Cryptology, 2021(1):185-216.
|
[6] |
GUTIERREZ A F, LEURENT G, NAYA-PLASENCIA M, et al. New Results on Gimli: Full-Permutation Distinguishers and Improved Collisions[C] //Lecture Notes in Computer Science:12491. Heidelberg: Springer Verlag, 2020:33-63.
|
[7] |
BIHAM E, BIRYUKOV A, SHAMIR A. Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials[C]//Lecture Notes in Computer Science:1592. Heidelberg: Springer Verlag, 1999:12-23.
|
[8] |
魏悦川, 潘晓中, 戎宜生, 等. 对PRINCE分组密码的不可能差分攻击[J]. 西安电子科技大学学报, 2017, 44(1):119-124.
|
|
WEI Yuechuan, PAN Xiaozhong, RONG Yisheng, et al. Impossible Differential Cryptanalysis on the PRINCE[J]. Journal of Xidian University, 2017, 44(1):119-124.
|
[9] |
KIM J, HONG S, Lee S, et al. Impossible Differential Cryptanalysis for Block Cipher Structures[C]//Lecture Notes in Computer Science:2904. Heidelberg: Springer Verlag, 2003:82-96.
|
[10] |
WU S, WANG M. Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers[C]//Lecture Notes in Computer Science:7668. Heidelberg: Springer Verlag, 2012:283-302.
|
[11] |
CUI T, CHEN S, FU K, et al. New Automatic Tool for Finding Impossible Differentials and Zero-Correlation Linear Approximations[J/OL].[2021-02-01].DOI:10.1007/s11432-018-1506-4.
doi: 10.1007/s11432-018-1506-4
|
[12] |
SUN S, HU L, WANG P, et al. Automatic Security Evaluation and(Related-key) Differential Characteristic Search:Application to SIMON,PRESENT,LBlock,DES(L) and Other Bit-Oriented Block Ciphers[C]//Lecture Notes in Computer Science:8873. Heidelberg: Springer Verlag, 2014:158-178.
|