[1] |
NIST. Lightweight Cryptography Projects (2021)[EB/OL].[2021-03-29]. https://csrc.nist.gov/Projects/lightweight-Cryptography/finalists.
|
[2] |
CACR. 全国密码算法设计竞赛 (2018)[EB/OL].[2018-06-11]. https://sfjs.cacrnet.org.cn/site/term/list_76_1.html.
|
[3] |
吴文玲, 张蕾, 郑雅菲, 等. 分组密码uBlock[J]. 密码学报, 2019, 6(6):690-703.
doi: 10.13868/j.cnki.jcr.000334
|
|
WU Wenling, ZHANG Lei, ZHENG Yafei, et al. The Block Cipher uBlock[J]. Journal of Cryptologic Research, 2019, 6(6):690-703.
doi: 10.13868/j.cnki.jcr.000334
|
[4] |
崔婷婷, 王美琴, 樊燕红, 等. Ballet:一个软件实现友好的分组密码算法[J]. 密码学报, 2019, 6(6):704-712.
doi: 10.13868/j.cnki.jcr.000335
|
|
CUI Tingting, WANG Meiqin, FAN Yanhong, et al. Ballet:A Software-Friendly Block Cipher[J]. Journal of Cryptologic Research, 2019, 6(6):704-712.
doi: 10.13868/j.cnki.jcr.000335
|
[5] |
CSRC. Lightweight Cryptography-Round 2 Candidates (2020)[EB/OL].[2020-06-20]. https://csrc.nist.gov/Projects/lightweightcryptog-raphy/round-2-candidates.
|
[6] |
BERNSTEIN D J, KÖLBL S, LUCKS S, et al. Gimli:A Cross-Platform Permutation[C]// Proceedings of the 19th International Conference on Cryptographic Hardware and Embedded Systems (CHES 2017).Heidelberg:Springer, 2017:299-320.
|
[7] |
BEIERLE C, BIRYUKOV A, DOS SANTOS L C, et al. Lightweight AEAD and Hashing Using the SPARKLE Permutation Family[J]. IACR Transactions on Symmetric Cryptology, 2020, 2020(S1):208-261.
|
[8] |
叶涛, 韦永壮, 李灵琛. KNOT认证加密算法的零和区分器分析[J]. 西安电子科技大学学报, 2021, 48(1):76-86.
|
|
YE Tao, WEI Yongzhuang, LI Lingchen. Analysis of Zero-Sum Distinguisher of the KNOT Authenticated Encryption Algorithm[J]. Journal of Xidian University, 2021, 48(1):76-86.
|
[9] |
谭豪, 申兵, 苗旭东, 等. Gimli认证加密方案的不可能差分分析[J]. 西安电子科技大学学报, 2022, 49(5):213-220.
|
|
TAN Hao, SHEN Bing, MIAO Xudong, et al. Impossible Differential Cryptanalysis of the Gimli Authenticated Encryption Scheme[J]. Journal of Xidian University, 2022, 49(5):213-220.
|
[10] |
BEIERLE C, BIRYUKOV A, DOS SANTOS L C, et al. Alzette:A 64-bit ARX-Box[C]// Proceedings of the 40th Annual International Cryptology Conference (CRYPTO 2020).Heidelberg:Springer, 2020:419-448.
|
[11] |
许峥, 李永强, 王明生. Alzette的安全性分析[J]. 密码学报, 2022, 9(4):698-708.
|
|
XU Zheng, LI Yongqiang, WANG Mingsheng. Security Analysis of Alzette[J]. Journal of Cryptologic Research, 2022, 9(4):698-708.
|
[12] |
HUANG M, XU Z, WANG L. On the Probability and Automatic Search of Rotational-XOR Cryptanalysis on ARX Ciphers[J]. The Computer Journal, 2022, 65(12):3062-3080.
doi: 10.1093/comjnl/bxab126
|
[13] |
LIU Y, SUN S, LI C. Rotational Cryptanalysis from a Differential-Linear Perspective[C]// Proceedings of the 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2021).Heidelberg:Springer, 2021:741-770.
|
[14] |
NIU Z, SUN S, LIU Y, et al. Rotational Differential-Linear Distinguishers of ARX Ciphers with Arbitrary Output Linear Masks[C]// Proceedings of 42nd Annual International Cryptology Conference (CRYPTO 2022).Heidelberg:Springer, 2022:3-32.
|
[15] |
LIU Y, NIU Z, SUN S, et al. Rotational Differential-Linear Cryptanalysis Revisited[J]. Journal of Cryptology 2023, 36(3):1-45.
doi: 10.1007/s00145-022-09441-3
|
[16] |
MORAWIECKI P, PIEPRZYK J, SREBRNY M. Rotational Cryptanalysis of Round-Reduced Keccak[C]// Proceedings of the 20th International Workshop on Fast Software Encryption (FES 2013).Heidelberg:Springer, 2013:241-262.
|
[17] |
BERTONI G, DAEMEN J, PEETERS M, et al. Keccak[C]// Proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2013).Heidelberg:Springer, 2013:313-314.
|
[18] |
LIPMAA H, MORIAI S. Efficient Algorithms for Computing Differential Properties of Addition[C]// Proceedings of the 8th International Workshop on Fast Software Encryption (FSE 2001).Heidelberg:Springer, 2002:336-350.
|
[19] |
WALLÉN J. Linear Approximations of Addition Modulo 2n[C]// Proceedings of the 10th International Workshop on Fast Software Encryption (FSE 2003).Heidelberg:Springer, 2003:261-273.
|
[20] |
NYBERG K, WALLÉN J. Improved Linear Distinguishers for SNOW 2.0[C]// Proceedings of the 13th International Workshop on Fast Software Encryption (FSE 2006).Heidelberg:Springer, 2006:144-162.
|
[21] |
FU K, WANG M, GUO Y, et al. MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck[C]// Proceedings of the 23rd International Conference on Fast Software Encryption (FSE 2016).Heidelberg:Springer, 2016:268-288.
|
[22] |
GUROBI. Gurobi optimizer 10.0.0 (2022)[EB/OL].[2022-11-10]. http://www.gurobi.cn/.
|