1 |
ZAINUDDINN, DAUDM, AHMADS, et al. A study on privacy issues in Internet of Things(IoT)[C]//Proceedings of the 5th International Conference on Cryptography, Security and Privacy. New York: IEEE, 2021: 96-100.
|
2 |
SHAIKHE, MOHIUDDINI, MANZOORA. Internet of Things(IoT): Security and privacy threats[C]//Proceedings of the 2nd International Conference on Computer Applications & Information Security. New York: IEEE, 2019: 1-6.
|
3 |
GUOJ, PEYRINT, POSCHMANNA, et al. The LED block cipher[C]// PRENEEL B, TAKAGI T. Proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems. Berlin: Springer, 2011: 326-341.
|
4 |
WUW, ZHANGL. LBlock: a lightweight block cipher[C]//LOPEZ J, TSUDIK G. Proceedings of the 9th International Conference on Applied Cryptography and Network Security. Berlin: Springer, 2011: 327-344.
|
5 |
BORGHOFFJ, CANTEAUTA, GÜNEYSUT, et al. PRINCE-a low-latency block cipher for pervasive computing applications[C]//WANG X, SAKO K. Proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2012: 208-225.
|
6 |
BANIKS, BOGDANOVA, ISOBET, et al. Midori: A block cipher for low energy[C]//IWATA T, CHEON J. Proceedings of the 21st International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2015: 411-436.
|
7 |
BEIERLEC, LEANDERG, MORADIA, et al. CRAFT: lightweight tweakable block cipher with efficient protection against DFA attacks[J]. IACR Transactions on Symmetric Cryptology, 2019, 2019(1): 5-45.
|
8 |
KIMH, JEONY, KIMG, et al. PIPO: A lightweight block cipher with efficient higher-order masking software implementations[C]//HONG D. Proceedings of the 23rd Information Security and Cryptology. Berlin: Springer, 2020: 99-122.
|
9 |
BEIERLEC, JEANJ, KÖLBLS, et al. The SKINNY family of block ciphers and its low-latency variant MANTIS[C]//ROBSHAW M, KATZ J. Proceedings of the 36th International Cryptology Conference. Berlin: Springer, 2016: 123-153.
|
10 |
KILIANJ, ROGAWAYP. How to protect DES against exhaustive key search[J]. Lecture Notes in Computer Science, 1996, 1109: 252-267.
|
11 |
LISKOVM, RIVESTR L, WAGNERD. Tweakable block ciphers[J]. Journal of Cryptology, 2002, 2442: 531-46.
|
12 |
JEANJ, NIKOLIĆI, PEYRINT. Tweaks and keys for block ciphers: The TWEAKEY framework[C]//SARKAR P, IWATA T. Proceedings of the 20th International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2014: 274-288.
|
13 |
DOBRAUNIGC, EICHLSEDERM, KALESD, et al. Practical key-recovery attack on MANTIS5[J]. IACR Transactions on Symmetric Cryptology, 2016, 2016(2): 248-260.
|
14 |
EICHLSEDERM, KALESD. Clustering related-tweak characteristics: application to MANTIS-6[J]. IACR Transactions on Symmetric Cryptology, 2018, 2018(2): 111-132.
|
15 |
CHENS Y, LIUR, CUIT T, et al. Automatic search method for multiple differentials and its application on MANTIS[J]. Science China Information Sciences, 2019, 62(3): 145-159.
|
16 |
ANKELER, DOBRAUNIGC, GUOJ, et al. Zero-correlation attacks on tweakable block ciphers with linear tweakey expansion[J]. IACR Transactions on Symmetric Cryptology, 2019, 2019(1): 192-235.
|
17 |
BEYNET. Block cipher invariants as eigenvectors of correlation matrices[J]. Journal of Cryptology, 2020, 33(3): 1156-1183.
|
18 |
BONEHD, DEMILLOR, LIPTONR. On the importance of checking cryptographic protocols for faults[C]//FUMY W. Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 1997: 37-51.
|
19 |
BIHAME, SHAMIRA. Differential fault analysis of secret key cryptosystems[C]//KALISKI B S. Proceedings of the 17th International Cryptology Conference. Berlin: Springer, 1997: 513-525.
|
20 |
COURTOISN T, WARED, JACKSONK. Fault-algebraic attacks on inner rounds of DES[C]//Proceedings of the European Smart Card Security Conference. Montreuil: Computer Science, 2010: 22-24.
|
21 |
DERBEZP, FOUQUEP A, LERESTEUXD. Meet-in-the-middle and impossible differential fault analysis on AES[C]//PRENEEL B, TAKAGI T. Proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems. Berlin: Springer, 2011: 274-291.
|
22 |
FUHRT, JAULMESE, LOMNÉV, et al. Fault attacks on AES with faulty ciphertexts only[C]//Proceedings of the Workshop on Fault Diagnosis and Tolerance in Cryptography. New York: IEEE, 2013: 108-118.
|
23 |
DOBRAUNIGC, EICHLSEDERM, KORAKT, et al. Statistical fault attacks on nonce-based authenticated encryption schemes[C]//CHEON J, TAKAGI T. Proceedings of the 22nd International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2016: 369-395.
|
24 |
LIW, LIAOL F, GUD W, et al. Ciphertext-only fault analysis on the LED lightweight cryptosystem in the Internet of Things[J]. IEEE Transactions on Dependable and Secure Computing, 2019, 16(3): 454-461.
|
25 |
李玮, 吴益鑫, 谷大武, 等. LBlock轻量级密码算法的唯密文故障分析[J]. 计算机研究与发展, 2018, 55(10): 2174-2184.
|
|
LIW, WUY X, GUD W, et al. Ciphertext-only fault analysis of the LBlock lightweight cipher[J]. Journal of Computer Research and Development, 2018, 55(10): 2174-2184. (in Chinese)
|
26 |
李玮, 吴益鑫, 谷大武, 等. SIMON轻量级密码算法的唯密文故障分析[J]. 通信学报, 2019, 40(11): 122-137.
|
|
LIW, WUY X, GUD W, et al. Ciphertext-only fault analysis of the SIMON lightweight cipher[J]. Journal on Communications, 2019, 40(11): 122-137. (in Chinese)
|