Citation: | ZHANG Lei and WU Wenling, “Improved Differential and Linear Active S-Boxes Search Techniques for Feistel Type Ciphers,” Chinese Journal of Electronics, vol. 24, no. 2, pp. 343-348, 2015, doi: 10.1049/cje.2015.04.020 |
A. Biryukov and D. Khovratovich, “Related-key cryptanalysis of the full AES-192 and AES-256”, Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, pp.1-18, 2009.
|
A. Biryukov and I. Nikolic, “Automatic search for related-key differential characteristics in byte-oriented block ciphers: Application to AES, Camellia, Khazad and others”, Proceedings of the 29th International Conference on the Theory and Application of Cryptographic Techniques, French Riviera, pp.322-344, 2010.
|
C. Bouillaguet, P. Derbez and P.A. Fouque, “Automatic search of attacks on round-reduced AES and applications”, Proceedings of the 31th International Cryptology Conference, Santa Barbara, CA, USA, pp.169-187, 2011.
|
W.L. Wu and L. Zhang, “LBlock: A lightweight block cipher”, Proceedings of the 9th International Conference on Applied Cryptography and Network Security, Nerja, Spain, pp.327-344, 2011.
|
K. Nyberg, “Generalized Feistel networks”, Proceedings of the 2nd International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, pp.90-104, 1996.
|
B. Schneier and J. Kelsey, “Unbalanced Feistel networks and block cipher design”, Proceedings of the 3rd International Workshop on Fast Software Encryption, Cambridge, UK, pp.121-144, 1996.
|
T. Suzaki and K. Minematsu, “Improving the generalized Feistel”, Proceedings of the 17th International Workshop on Fast Software Encryption, Seoul, Korea, pp.19-39, 2010.
|
M. Matsui, “On correlation between the order of S-boxes and the strength of DES”, Proceedings of the 13th Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, pp.366-375, 1994.
|
A. Viterbi, “Error bounds for convolutional codes and an asymptotically optimum decoding algorithm”, IEEE Transactions on Information Theory, Vol.13, No.2, pp.260-269, 1967.
|
T. Shirai and B. Preneel, “On Feistel ciphers using optimal diffusion mappings across multiple rounds”, Proceedings of the 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, pp.1-15, 2004.
|
Y. Igarashi and T. Kaneko, “On the truncated path search for the maximum differential characteristic probability on a generalized Feistel-type block cipher”, Proceedings of the IEEE 2010 International Symposium on Information Theory and its Applications, Taichung, Taiwan, pp.784-788, 2010.
|
Z. Gong, Y.Y. Luo, X.J. Lai, et al., “On the security of doubleblock-length hash functions with rate 1”, Chinese Journal of Electronics, Vol.21, No.3, pp.566-570, 2012.
|
Y.B. Zhou, W.L. Wu, N.N. Xu, et al., “Differential fault attack on Camellia”, Chinese Journal of Electronics, Vol.18, No.1, pp.13-19, 2009.
|