Citation: | HOU Tao, ZHANG Jiyan, CUI Ting, “Recover the Secret Components in a ForkCipher,” Chinese Journal of Electronics, vol. 32, no. 3, pp. 597-602, 2023, doi: 10.23919/cje.2021.00.368 |
[1] |
E. Andreeva, R. Reyhanitabar, K. Varici, et al., “Forking a blockcipher for authenticated encryption of very short messages,” Cryptology ePrint Archive, Paper 2018/916, Available at: https://eprint.iacr.org/2018/916, 2019.
|
[2] |
S. Banik, J. Bossert, A. Jana, et al., “Cryptanalysis of ForkAES,” in Proceedings of the 17th International Conference on Applied Cryptography and Network Security, Bogota, Colombia, pp.43–63, 2019.
|
[3] |
A. Biryukov and A. Shamir, “Structural cryptanalysis of SASAS,” in Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Innsbruck, Austria, pp.395–405, 2001.
|
[4] |
A. Biryukov, C. Bouillaguet, and D. Khovratovich, “Cryptographic schemes based on the ASASA structure: Black-box, white-box, and public-key (extended abstract),” in Proceedings of the 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, China, pp.63–84, 2014.
|
[5] |
I. Dinur, O. Dunkelman, T. Kranz, et al., “Decomposing the ASASA block cipher construction,” Cryptology ePrint Archive, Paper 2015/507, Available at: https://eprint.iacr.org/2015/507, 2015.
|
[6] |
T. Tiessen, L. R. Knudsen, S. Klbl, et al., “Security of the AES with a secret S-Box,” in Proceedings of the 22nd International Workshop on Fast Software Encryption, Istanbul, Turkey, pp.175–189, 2015.
|
[7] |
A. Biryukov, D. Khovratovich, and L. P. Perrin, “Multiset-algebraic cryptanalysis of reduced Kuznyechik, Khazad, and secret SPNs,” IACR Transactions on Symmetric Cryptology
, vol.2016, no.2, pp.226–247, 2016. doi: 10.13154/tosc.v2016.i2.226-247
|
[8] |
A. Biryukov, G. Leurent, and L. Perrin, “Cryptanalysis of Feistel networks with secret round functions,” in Proceedings of the 22nd International Conference on Selected Areas in Cryptography, Sackville, Canada, pp.102–121, 2015.
|
[9] |
A. Biryukov and D. Khovratovich, “Decomposition attack on SASASASAS,” Cryptology ePrint Archive, Paper 2015/646, Available at: https://eprint.iacr.org/2015/646, 2015.
|