Citation: | Linear Approximations of Pseudo-Hadamard Transform[J]. Chinese Journal of Electronics, 2012, 21(4): 715-718. |
Mitsuru Matsui, “Linear cryptanalysis method for DES cipher”,in Advances in Cryptology-Eurocrypt 1993, Vol.765 of LectureNotes in Computer Science, pp.386-397, Springer-Verlag, 1993.
|
Johan Wallen, “Linear approximations of addition modulo 2n”,in Fast Software Encryption 2003, Vol.2887 of Lecture Notes inComputer Science, pp.261-273, Springer-Verlag, 2003.
|
James L. Massey, “SAFER K-64: A byte-oriented blockcipheringalgorithm”, in Ross Anderson, Fast Software Encryption’93, Vol.809 of Lecture Notes in Computer Science, pp.1-17,Springer-Verlag, 1993.
|
Bruce Schneier, John Kelsey, Doug Whiting, David Wagner etal., The Twofish Encryption Algorithm: A 128-Bit Block Cipher,John Wiley & Sons, New York, USA, 1999.
|
Eli Biham and Adi Shamir, “Differential cryptanalysis of DESlikecryptosystems”, Journal of Cryptology, Vol.4, No.1, pp.3-72, 1991.
|
Helger Lipmaa, “On differential properties of Pseudo-Hadamardtransform and related mappings”, in Progress in Cryptology-Indocrypt 2002, Vol.2551 of Lecture Notes in Computer Science,pp.48-61, Springer-Verlag, 2002.
|
Helger Lipmaa and Shiho Moriai, “Efficient algorithms for computingdifferential properties of addition”, Fast Software Encryption’2001, Vol.2355 of Lecture Notes in Computer Science,pp.336-350, Springer-Verlag, 2002.
|
Hiroshi Miyano, “Addend dependency of differential/linearprobability of addition”, IEICE Trans. Fundamentals, Vol.81,No.1, pp.106-109, 1998.
|
Zhang Wentao, Qing Sihan, Wu Wenling, “Improveddifferential-linear cryptanalysis of reduced-round SAFER++”,Chinese Journal of Electronics, Vol.13, No.1, pp.111-115, 2004.
|
[1] | PANG Shanqi, WANG Jing, WANG Xunan, WANG Xiaoli. Application of Orthogonal Array and Walsh Transform in Resilient Function[J]. Chinese Journal of Electronics, 2018, 27(2): 281-286. DOI: 10.1049/cje.2017.09.011 |
[2] | LIU Lubo, LUO Maokang, LAI Li. Instantaneous Frequency Estimation Based on the Wigner-Ville Distribution Associated with Linear Canonical Transform (WDL)[J]. Chinese Journal of Electronics, 2018, 27(1): 123-127. DOI: 10.1049/cje.2017.07.009 |
[3] | WANG Xiaobo, ZHANG Qiliang, ZHOU You, QIAN Jing, ZOU Hongxing. Linear Canonical Transform Related Operators and Their Applications to Signal Analysis—Part II: Applications[J]. Chinese Journal of Electronics, 2015, 24(2): 312-316. DOI: 10.1049/cje.2015.04.014 |
[4] | XU Bin, LI Ruiguang, LIU Yashu, YAN Hanbing, LI Siyuan, ZHANG Honggang. Filtering Chinese Image Spam Using Pseudo-OCR[J]. Chinese Journal of Electronics, 2015, 24(1): 134-139. |
[5] | WANG Xiaobo, ZHANG Qiliang, ZHOU You, QIAN Jing, ZOU Hongxing. Linear Canonical Transform Related Operators and Their Applications to Signal Analysis—— Part I: Fundamentals[J]. Chinese Journal of Electronics, 2015, 24(1): 102-109. |
[6] | HE Shiquan, NIE Zaiping, HU Jun. Thin Dielectric Sheets Approximations for EM Scattering from Layered Dielectric Structures[J]. Chinese Journal of Electronics, 2013, 22(2): 419-425. |
[7] | LUO Xiaohua, DING Yong, CHEN Lisheng, ZHU Jiaojiao, YAN Xiaolang. Defect Density Extraction of Gate Oxide Shorts Incorporating Defect Clustering with Pseudo Transistor Arrays[J]. Chinese Journal of Electronics, 2013, 22(1): 36-40. |
[8] | JIANG Jie, GUO Baolong, LAI Changcai, MO Wei. Line Prediction and Transform for Intra Coding[J]. Chinese Journal of Electronics, 2011, 20(3): 516-520. |
[9] | ZHANG Wei, TAO Ran, WANG Yue. Linear Canonical S Transform[J]. Chinese Journal of Electronics, 2011, 20(1): 63-66. |
[10] | ZHANG Weitao, LIU Ning, LOU Shuntian. Joint Approximate Diagonalization Using Bilateral Rank-Reducing Householder Transform with Application in Blind Source Separation[J]. Chinese Journal of Electronics, 2009, 18(3): 471-476. |