[1] Daemen J,Rijmen V.AES proposal:Rijndael .the First Advanced Encryption Standard Candidate Coference .USA,NIST,1998.1-45. [2] 魏悦川,孙兵,李超.对Rijndael-256算法新的积分攻击[J].电子学报,2011,39(2):476-480. Wei Y C,Sun B,Li C.New integral attack on Rijndael-256[J].Acta Electronical Sinica,2011,39(2):476-480.(in Chinese) [3] Faugère J C,Gianni P,Lazard D,Mora T.Efficient computation of zero-dimensional gröbner bases by change of ordering[J].Journal of Symbolic Computation,1993,16:329-344. [4] Courtois N T,Pieprzyk J.Cryptanalysis of block ciphers with overdefined systems of equations .LACR eprint server:www.iacr.org,April 2002. [5] Yu SASAKI.Known-key attacks on rijndael with large blocks and strengthening shiftrow parameter[J].IEICE TRANSACTIONS on Fundamentals of Electronics,Communications and Computer Sciences,2012,E95-A (1):21-28. [6] Carlos Cid,Gaetan Leurent.An analysis of the XSL algorithm[J].Lecture Notes in Computer Science,2005,3788:333-345. [7] Robshaw M J B,Murphy S.Comments on the security of the AES and the XSL technique .http://www.cosic.esat.kuleuven.ac.be/nessie/reports/,May 2007. [8] Johannes Buchmann,Andrei Pyshkin,Ralf-Philipp Weinmann.A zero-dimensional Grobner basis for AES-128[J].Lecture Notes in Computer Science,2006,4047:78-88. [9] Satrajit Ghosh,Abhijit Das.An improvement of linearization-based algebraic attacks[J].Lecture Notes in Computer Science,2011,7011:157-167. [10] Z'aba M.R,Wong K,Dawson E,et al.Algebraic analysis of small scale LEX-BES .Malaysia,Proceedings of International Cryptology Conference 2010 .Melaka:Universiti Teknikal Malaysia Melaka,2010.77-82. [11] Ajwa I A,Liu Zhoujun,Wang Paul.Grobner bases algorithm .http://www.cm.mcs.kent.edu/reports/ 1995/gb.pdf,June 2,2007. [12] Zhou Yongbin,Wu Wenling,Xu Nannan,Feng Dengguo.Differential fault attack on camellia[J].Chinese Journal of Electronics,2009,18(1):13-19. [13] Johannes Buchmann,Andrei Pyshkin,Ralf-Philipp Weinmann.Block ciphers sensitive to Grobner basis attacks[J].Lecture Notes in Computer Science,2006,3860:313-331. [14] Thomas Becker,Volker Weispfenning.Grobner Bases-A Computational Approach to Commutative Algebra[M].New York/Berlin:Springer-Verlag,1991. [15] Faugère,Jean-Charles.A new efficient algorithm for computing Grobner bases without reduction to 0 F5 .the 2002 international symposium on Symbolic and algebraic computation .Lille:ACM,2002.44-60. [16] 刘景伟,韦宝典.AES S盒的密码特性分析[J].西安电子科技大学学报,2004,31(2):255-259. Liu J W,Wei B D.Analysis of the cryptographic properties of the AES S-box[J].Journal of Xidian University,2004,31(2):255-259.(in Chinese) [17] Jean-Charles Faugère,Antoine Joux.Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases . Advances in Cryptology-CRYPTO 2003 .California:Springer-Verlag,2003.LNCS 2729.44-60. |