JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2015, Vol. 50 ›› Issue (09): 49-54.doi: 10.6040/j.issn.1671-9352.0.2015.070
Previous Articles Next Articles
DONG Xiang-zhong, GUAN Jie
CLC Number:
[1] BOGDANOV A, KNUDSEN L, LEANDER G, et al. Present: an ultra-lightweight block cipher[C]//Cryptographic Hardware and Embedded Systems-CHES 2007. Berlin Heidelberg: Springer, 2007:450-466. [2] BORGHO J, CANTEAUT A, GUNEYSU T, et al. PRINCE-a low-latency block cipher for pervasive computing applications[C]//Proceedings of ASIACRYPT 2012. Berlin Heidelberg:Springer, 2012:208-225. [3] CANNIERE C D, DUNKELMAN O, KNEZEVIC M. KATAN and KTANTAN-a family of small and efficient hardware-oriented block ciphers[C]//Proceedings of Cryptographic Hardware and Embedded Systems. Berlin Heidelberg: Springer, 2009:272-288. [4] SHIRAI T, SHIBUTANI K, AKISHITA T, et al. The 128-Bit Blockcipher CLEFIA[C]//Proceedings of Fast software encryption. Berlin Heidelberg: Springer, 2007:181-195. [5] MATSUI M. Linear cryptanalysis method for DES cipher[C]//Advances in Cryptology-EUROCRYPT'93. Berlin Heidelberg: Springer, 1994:386-397. [6] ALKHZAIMI H, LAURIDSEN M M. Cryptanalysis of the SIMON family of block ciphers[EB/OL]. [2014-12-10]. http://eprint.iacr.org/2013/543.pdf. [7] ABED F, LIST E, LUCKS S, et al. Differential and linear cryptanalysis of reduced-round SIMON[EB/OL]. [2014-12-25]. http://eprint.iacr.org/2013/526.pdf. [8] WANG N, WANG X, JIA K, et al. Improved differential attacks on reduced SIMON versions[EB/OL]. [2014-12-25]. http://eprint.iacr.org/2014/448.pdf. [9] ALIZADEH J, ALKHZAIMI H A, AREF M R, et al. Improved linear cryptanalysis of round reduced SIMON[EB/OL]. [2014-12-20]. http://eprint.iacr.org/2014/681.pdf. [10] TUPSAMUDRE H, BISHT S, MUKHOPADHYAY D. Differential fault analysis on the families of SIMON and SPECK ciphers[C]//Fault Diagnosis and Tolerance in Cryptography(FDTC). New York:IEEE, 2014:40-48. [11] WANG Qingju, LIU Zhiqiang, VARICI K, et al. Cryptanalysis of Reduced-round SIMON32 and SIMON48[J]. Lecture Notes in Computer Science, 2014, 8885:143-160. [12] BEAULIEU R, SHORS D, SMITH J, et al. The SIMON and SPECK families of lightweight block ciphers[EB/OL]. [2015-01-05]. http://eprint.iacr.org/2013/404.pdf. |
[1] | CHENG Lu, WEI Yue-chuan, LI An-hui, PAN Xiao-zhong. Multidimensional zero-correlation linear cryptanalysis on Midori [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(2): 88-94. |
[2] | TAI Li-ting, SONG Han-feng, WANG Jiang-tao, ZHAN Qiong. The investigation of the gravity darkening and evolution in rotating star [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(5): 48-60. |
[3] | YIN Qing, WANG Nian-ping. Security evaluation for Piccolo structure against differential and linear cryptanalysis [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(3): 132-142. |
[4] | WANG Ling-yin1, LIU Ju2. Time-frequency block interleaving schemes for PAPR reduction in OFDM systems [J]. J4, 2012, 47(11): 83-87. |
[5] | WANG Jing-zhou 1, SONG Han-feng1,2. The simulations of the gravitational accelerations in a rotational distorted binary system [J]. J4, 2011, 46(7): 43-47. |
[6] | LU Yuan1, SONG Han-feng2, ZHONG Zhen3. The distribution of mass loss rate from stellar wind based on the model of triaxial ellipsoid [J]. J4, 2010, 45(9): 90-95. |
[7] | LU Yuan1, SONG Han-feng1,2, ZHONG Zhen1. Wind and angular momentum losses and evolution in the rotational binary system [J]. J4, 2010, 45(3): 23-28. |
[8] | DU Ning,GUO Wei-hua,WU Da-qian,WANG Qi and WANG Ren-qing . Inter-specific relations of shrub and herbage species under a typical forest on Kunyu Mountain [J]. J4, 2007, 42(3): 71-77 . |
|