[1] Xiao L,Heys H M.Hardware design and analysis of block cipher components[J].Lecture Notes in Computer Science,2002,2587:164-181.
[2] NTT-Nippon Telegraph and Telephone Corporation.E2:a 128-Bit Block Cipher[EB/OL].http://info.isl.ntt.co.jp/e2.2007.
[3] Aoki K,Ichikawa T,Kanda M,et al.Camellia:a 128-bit block cipher suitable for multiple platforms[A].Douglas R.Selected Areas in Cryptography-SAC 2000[C].Canada:Springer-Verlag,2000.41-54.
[4] Kwon D,Kim J,Park S,et al.New block cipher:ARIA[A].Lim J I.International Conference on Information Security and Cryptology-ICISC 2003[C].Berlin:Springer-Verlag,2003.432-445.
[5] Kang Ju-sung.Practical and provable security against differential and linear cryptanalysis for substitution-permutation networks[J].ETRI Journal,2001,23(4):158-167.
[6] 吴文玲,冯登国,张文涛.分组密码的设计与分析[M].北京:清华大学出版社,2009.240-245.
[7] Bon Wook Koo,Hwan Seok Jang,Jung Hwan Song.On constructing of a 32×32 binary matrix as a diffusion layer for a 256-bit block cipher[A].Min S R.International Conference on Information Security and Cryptology-ICISC 2006[C].Berlin:Springer-Verlag,2006.51-64.
[8] 崔霆,陈河山,金晨辉.分组密码二元扩散结构的几点注记[J].软件学报,2012,23(9):2430-2437. Cui T,Chen H S,Jin C H.Several properties of binary diffusion layers for block cipher[J].Journal of Software,2012,23(9):2430-2437.(in Chinese)
[9] 郭磊,郑浩然,刘明伟.一类具有最大分支数的16阶0-1矩阵构造[J].计算机工程,2013,39(12):118-121. Guo L,Zheng H R,Liu M W.A class of 16-order 0-1 matrix construction with the largest number of branches[J].Computer Engineering and Applications,2013,39(12):118-121.(in Chinese)
[10] Sakalli M T,Aslan B.On the algebraic construction of cryptographically good 32×32 binary linear transformations[J].Security and Communication Networks,2014,259(1):485-494.
[11] Akleylek S,Rijmen V,Sakallinodot,et al.Efficient methods to generate cryptographically significant binary diffusion layers[J].IET Information Security,2017,11(4):177-187.
[12] Akleylek S,Sakalli M T,Ozturk E,et al.Generating binary diffusion layers with maximum/high branch numbers and low search complexity[J].Security and Communication Networks,2016,9(16):3558-3569.
[13] Koo B W,Jang H S,Song J H.Constructing and cryptanalysis of a 16×16 binary matrix as a diffusion layer[A].Kijoon C.Information Security Applications:4th International Workshop-WISA 2003[C].Berlin:Springer-Verlag,2003.489-503.
[14] Daemen J.Cipher and Hash Function Design Strategies Based on Linear and Differential Cryptanalysis[D].Belgium:Catholic University of Louvain,1995.101-103. |