[1] Wenling Wu,Lei Zhang.LBlock:A lightweight block cipher .J Lopez,G Tsudik.2011 9th International Conference on Applied Cryptography and Network Security .Spain:Springer-Verlag,LNCS 6715,2011.327-344.[2] Bogdanov A,Knudsen L R,Leander G,Parr C,Poschmann A,Robshaw M J B,Seurin Y,Vikkelsoe C.PRESENT:an ultra-lightweight block cipher .Paillier,P,Verbauwhede,I.2007 Workshop on Cryptographic Hardware and Embedded Systems .Austria:Springer-Verlag,LNCS 4727,2007.450-466.[3] De Canniere,C,Dunkelman,Orr,Knezevic,M.KATAN and KTANTAN-a family of small and effcient hardware-oriented block ciphers .Clavier,C,Gaj,K.2009 Workshop on Cryptographic Hardware and Embedded Systems .Switzerland:Springer-Verlag,LNCS 5747,2009.272-288.[4] Lim C,Korkishko T.mCrypton-a lightweight block cipher for security of low-cost RFID tags and sensors .JooSeok Song,Taekyoung Kwon,Moti Yung.2005 6th Workshop on Information Security Applications .Korea:Springer-Verlag,LNCS 3786,2006.243-258.[5] Leander G,Paar C,Poschmann A.New lightweight DES variants .Alex Biryukov.2007 14th Fast Software Encryption .Luxembourg:Springer-Verlag,LNCS 4593,2007.196-210.[6] Izadi M,Sadeghiyan B,Sadeghian S,Khanooki H.MIBS:a new lightweight block cipher .Garay,Juan A.,Otsuka,Akira.2009 8th International Conference on Cryptology and Network Security .Japan:Springer-Verlag,LNCS 5888,2009.334-348.[7] Guo J,Peyrin T,Poschmann A,Robshaw M.The LED block cipher .B.Preneel and T.Takagi.2011 Workshop on Cryptographic Hardware and Embedded Systems .Japan:Springer-Verlag,LNCS 6917,2011.326-341.[8] 张文英,刘祥忠.对基于NLFSR分组密码KTANTAN32的相关密钥中间相遇代数攻击[J].电子学报,2012,40(10):2097-2100. ZHANG Wen-ying.LIU Xiang-zhong.An related-key meet-in-the-middle algebraic attack on the NLFSR based block cipher KTANTAN32[J].Acta Electronica Sinica,2012,40(10):2097-2100.(in Chinese)[9] 唐学海,孙兵,李超.对8轮CLEFIA算法的一种现实攻击[J].电子学报,2011,20(7):1608-1612. Tang Xue-hai,Sun Bing,Li Chao.A real-world attack of 8-round CLEFIA[J].Acta Electronica Sinica,2011,20(7):1608-1612.(in Chinese)[10] Mathieu Renauld,Francois-Xavier Standaert.Algebraic side-channel attacks .Feng Bao,Moti Yung,Dongdai Lin,and Jiwu Jing.2009 5th China International Conference on Information Security and Cryptology .China:Springer-Verlag,LNCS 6151,2009.393-410.[11] Mathieu Renauld,Franois-Xavier Standaert,Nicolas Veyrat-Charvillon.Algebraic side-channel attacks on the AES:Why time also matters in DPA .Christophe Clavier and Kris Gaj.2009 Workshop on Cryptographic Hardware and Embedded Systems .Switzerland:Springer-Verlag,LNCS 5747,2009.97-111.[12] X J Zhao,S Z Guo,F.Zhang,et al.MDASCA:an enhanced algebraic side-channel attack for error tolerance and new leakage model exploitation .Schindler,Werner;Huss,Sorin.2012 3rd International Workshop on Constructive Side-Channel Analysis and Secure Design .Germany:Springer-Verlag,LNCS 7275,2012.231-248.[13] I Schaumuller-Bichl.Cryptanalysis of the data encryption standard by the method of formal coding .David Chaum.Advances in Cryptology,Proceedings of CRYPTO 1983 .USA:Springer-Verlag,LNCS 149,1983.235-255.[14] 彭昌勇,祝跃飞,顾纯祥,米顺强.1~5轮LBlock的多项式表示及完全性分析[J].计算机工程,2012,38(9):155-157. Peng Chang-yong,Zhu Yue-fei,Gu Cun-xiang et al.Polynomial expression and completeness analysis of 1~5 round LBlock [J].Computer Engineering,2012,38(9):155-157.(in Chinese) |