[1]NESSIE: New European Schemes for Signatures, Integrity and Encryption, Performance of Optimized Implementations of the NESSIE Primitives, Version 2.0 [EB/OL]. [2000-11-1]. https://www.cosic.esat.kuleuven.be/nessie/deliverables/D21-v2.pdf.
[2]Aoki K, Ichikawa T, Kanda M, et al. Camellia: a 128-bit Block Cipher Suitable for Multiple Platforms Design and Analysis [C]//Proceedings of TACS 1997: LNCS 1281. Berlin: Springer-Verlag, 1997: 39-56.
[3]Matsui M. New Block Encryption Algorithm MISTY [C]//Proceedings of FSE1997: LNCS1267. Berlin: Springer-Verlag, 1997: 54-68.
[4]Daemen J, Rijnmen V. The design of Rijndael AES: the Advanced Encryption Standard [M]. 1st ed. Berlin: Springer-Verlag, 2002, 30-45.
[5]Handschuh H, Naccache D. SHACAL, NESSIE[EB/OL]. [2001-6-1]. https://www.cosic.esat.kuleuven.be/nessie.
[6]National Institute of Standards and Technology. Federal Information Processing Standards Publication 180-1 (FIPS180-1) —Secure Hash Standard (SHA)[EB/OL]. [1995-04-10]. http://csrc.nist.gov/publications/fips/fips180/fips-180.pdf.
[7]Lai Xuejia, Massey J-L, Murphy S. Markov Ciphers and Differential Cryptanalysis [C]//Proceedings of EUROCRYPT1991: LNCS547. Berlin: Springer-Verlag, 1992: 17-38.
[8]Hong S, Kim J, Kim G, et al. Impossible Differential Attack 30-round SHACAL-2 [C]//Proceedings of INDOCRYPT2003: LNCS2904. Berlin: Springer-Verlag, 2003: 97-106.
[9]Shin Y, Kim J, Kim G, et al. Differential-linear Type Attacks on Reduced Rounds of SHACAL-2 [C]//Proceedings of ACISP2004: LNCS3108. Berlin: Springer-Verlag, 2004: 110-122.
[10]Kim J, Kim G, Lee S, et al. Related-key Attacks on Reduced Rounds of SHACAL-2 [C]//Proceedings of INDOCRYPT2004: LNCS 3348. Berlin: Springer-Verlag, 2004: 175-190.
[11]Lu Jiqiang, Lee C, Kim G, et al. Related-key Attack on 42-round SHACAL-2 [C]//Proceedings of ISC2006: LNCS 4176. Berlin: Springer-Verlag, 2006: 85-100.
[12]Lu Jiqiang, Kim J. Attacking 44 Rounds of the SHACAL-2 Block Cipher Using Related-key Rectangle Cryptanalysis [J]. IEICE Trans. Fundamentals, 2008, 91(9): 2588-2596.
[13]Wang G. Related-key Rectangle Attack on 43-Round SHACAL-2 [C]//Proceeding of ISPEC2007: LNCS 4464. Berlin: Springer-Verlag, 2007: 33-42.
[14]韦永壮,胡予濮. 42轮SHACAL-2的相关密钥矩形新攻击[J]. 通信学报, 2009, 30(1): 7-11.
Wei Yongzhuang, Hu Yupu. New Related-key Rectangle Attack on 42-round SHACAL-2 [J]. Journal on Communication, 2009, 30(1): 7-11.
[15]刘景美, 赵林森, 王新梅. 一种具有最小实现代价的AES改进方法[J]. 西安电子科技大学学报, 2009, 36(1): 52-57.
Liu Jingmei, Zhao Linsen, Wang Xinmei. Improvement of AES with Minimal Implementation Complexity [J]. Journal of Xidian University, 2009, 36(1): 52-57.
[16]钟名富, 胡予濮, 陈杰. 分组加密算法SMS4的14轮Square攻击[J]. 西安电子科技大学学报, 2008, 35(1): 105-109.
Zhong Mingfu, Hu Yupu, Chen Jie. Square Attack on the 14-round Block Cipher SMS4 [J]. Journal of Xidian University, 2008, 35(1): 105-109.
[17]Collard B, Standaert, F-X. Quisquater J-J. Improving the Time Complexity of Matsui’s Linear Cryptanalysis [C]//Proceeding of ICISC2007: LNCS 4817. Berlin: Springer-Verlag, 2007: 77-78.
[18]Kim T, Kim J, Hong S, Sung J. Linear and Differential Cryptanalysis of Reduced SMS4 Block Cipher [EB/OL]. [2008-05-08]. http://www.eprint.org/2008.
[19]季虎, 夏胜平, 郁文贤. 快速傅里叶变换算法概述[J]. 现代电子, 2001, 76 (3): 5-8.
Ji Hu, Xia Shengping, Yu Wenxian. Outline of Fast Fourier Transform Algorithm [J]. Modern Electronics, 2001, 76(3): 5-8. |