[1] Biham E, Shamir A.Differential cryptanalysis of DES-like cryptosystems[A].CRYPTO 1990[C].Santa Barbara, California, USA:Springer-Verlag, 1990.2-21.
[2] E Biham, A Biryukov, A Shamir.Cryptanalsis of skipjack reduced to 31 rounds using impossible differentials[A].EUROCRYPT 1999[C].Prague, Czech Republic:Springer-Verlag, 1999.12-23.
[3] Simon Knellwolf, Willi Meier, Naya Plasencia.Conditional differential cryptanalysis of NLFSR-based cryptosystems[A].ASIACRYPT 2010[C].Swissôtel Merchant Court, Singapore:Springer-Verlag, 2010.130-145.
[4] L R Knudsen.Truncated and higher order differentials[A].FSE'94[C].Leuven, Belgium:Springer-Verlag, 1994.196-211.
[5] 胡豫濮, 蔡勉, 肖国镇.一类高阶差分密码分析[J].电子学报, 1999, 27(10):74-78. Hu Yu Pu, Cai Mian, Xiao Guo-zhen.A class of high-order differential cryptanalysis[J].Acta Electronica Sinica, 1999, 27(10):74-78.(in Chinese)
[6] Wang W.Differential cryptanalysis of reduced-round PRESENT[A].AFRICACRYPT 2008[C].Africa, Casablanca, Morocco:Springer-Verlag, 2008.40-49.
[7] Gaoli Wang.Improved differential cryptanalysis of serpent[A].Computational Intelligence and Security (CIS), 2010[C].Nanning:Springer-Verlag, 2010.367-371.
[8] Lei Zang, Wen Tao Zhang, Wen Ling Wu.Cryptanalysis of reduced-round SMS4 block cipher[A].Information Security and Privacy[C].Wollongong, Australia:Springer-Verlag, 2008.216-229.
[9] 李超, 沈静.Camellia的差分和线性迭代特征[J].电子学报, 2005, 33(8):1345-1348. Li Chao, Shen Jing.Differential andlinear iterative characteristics of camellia[J].Acta Electronica Sinica, 2005, 33(8):1345-1348.(in Chinese)
[10] Nicolas T Corutois.An Improved Differential Attack on Full GOST[EB/OL].http://eprint.iacr.org, 2013-02.
[11] Biham E, Shamir A.Differential cryptanalysis of DES-like cryptosystems[J].Journal of Cryptology, 1991, 4(1):3-72.
[12] Céline Blondeau, Benoôt Gérard.Multiple differential cryptanalysis:Theory and practice[A].Fast Soft Encryption 2011[C].Lyngby, Denmark:Springer-Verlag, 2011.35-54.
[13] Céline Blondeau, Benôt Gérard, Kaisa Nyberg.Multiple Differential Cryptanalysis Using LLR and χ2 Statistics[EB/OL].http://eprint.iacr.org, 2012-09.[LL]
[14] Selcuk A A.On probability of success in linear and differential cryptanalysis[J].Journal of Cryptology, 2008, 21(1):131-147. |