Page 414 - 《软件学报》2024年第4期
P. 414
1992 软件学报 2024 年第 35 卷第 4 期
[10] Zhang WY, Rijmen V. Division cryptanalysis of block ciphers with a binary diffusion layer. IET Information Security, 2019, 13(2):
87–95. [doi: 10.1049/iet-ifs.2018.5151]
[11] ElSheikh M, Youssef AM. On MILP-based automatic search for bit-based division property for ciphers with (large) linear layers. In:
Proc. of the 26th Australasian Conf. on Information Security and Privacy. Cham: Springer, 2021. 111–131. [doi: 10.1007/978-3-030-
90567-5_6]
[12] Hong CL, Zhang SS, Chen SW, Lin D, Xiang ZJ. More accurate division property propagations based on optimized implementations of
linear layers. In: Proc. of the 17th Int’l Conf. on Information Security and Cryptology. Cham: Springer, 2021. 212–232. [doi: 10.1007/978-
3-030-88323-2_11]
[13] Hu K, Wang QJ, Wang MQ. Finding bit-based division property for ciphers with complex linear layers. IACR Trans. on Symmetric
Cryptology, 2020, 2020(1): 396–424. [doi: 10.13154/tosc.v2020.i1.396-424]
[14] Wu WL, Zhang L, Zheng YF, Li LC. The block cipher uBlock. Journal of Cryptologic Research, 2019, 6(6): 690–703 (in Chinese with
English abstract). [doi: 10.13868/j.cnki.jcr.000334]
[15] Tian WQ, Hu B. Integral cryptanalysis on two block ciphers Pyjamask and uBlock. IET Information Security, 2020, 14(5): 572–579. [doi:
10.1049/iet-ifs.2019.0624]
[16] Canteaut A, Duval S, Leurent G, Naya-Plasencia M, Perrin L, Pornin T, Schrottenloher A. Saturnin: A suite of lightweight symmetric
algorithms for post-quantum security. IACR Trans. on Symmetric Cryptology, 2020, 2020(S1): 160–207. [doi: 10.13154/tosc.v2020.iS1.
160-207]
[17] Gurobi Optimization, LLC. Gurobi optimizer reference manual. 2022. https://www.gurobi.com
[18] Paar C. Optimized arithmetic for Reed-Solomon encoders. In: Proc. of the 1997 IEEE Int’l Symp. on Information Theory. Ulm: IEEE,
1997. 250. [doi: 10.1109/ISIT.1997.613165]
[19] Boyar J, Matthews P, Peralta R. Logic minimization techniques with applications to cryptology. Journal of Cryptology, 2013, 26(2):
280–312. [doi: 10.1007/s00145-012-9124-7]
[20] Xiang ZJ, Zeng XY, Lin D, Bao ZZ, Zhang SS. Optimizing implementations of linear layers. IACR Trans. on Symmetric Cryptology,
2020, 2020(2): 120–145. [doi: 10.13154/tosc.v2020.i2.120-145]
[21] Abdelkhalek A, Sasaki Y, Todo Y, Tolba M, Youssef AM. MILP modeling for (large) S-boxes to optimize probability of differential
characteristics. IACR Trans. on Symmetric Cryptology, 2017, 2017(4): 99–129. [doi: 10.13154/tosc.v2017.i4.99-129]
附中文参考文献:
[14] 吴文玲, 张蕾, 郑雅菲, 李灵琛. 分组密码uBlock. 密码学报. 2019, 6(6): 690–703. [doi: 10.13868/j.cnki.jcr.000334]
黄明(1996-), 男, 硕士, 主要研究领域为对称密 曾乐(2000-), 女, 本科生, 主要研究领域为对称
码算法的安全性分析. 密码算法的安全性分析.
张莎莎(1982-), 女, 博士, 副教授, 主要研究领 向泽军(1990-), 男, 博士, 副教授, 主要研究领
域为对称密码算法的安全性分析. 域为对称密码算法的安全性分析与设计.
洪春雷(1997-), 男, 博士生, 主要研究领域为分
组密码的安全性分析.