SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.
Citation: | Xiao-Li Yu, Wen-Ling Wu, Zhen-Qing Shi, Jian Zhang, Lei Zhang, Yan-Feng Wang. Zero-Correlation Linear Cryptanalysis of Reduced-Round SIMON[J]. Journal of Computer Science and Technology, 2015, 30(6): 1358-1369. DOI: 10.1007/s11390-015-1603-5 |
[1] |
Bogdanov A, Knudsen L, Leander G et al. PRESENT: An ultra-lightweight block cipher. In Proc. the 9th International Workshop on Cryptographic Hardware and Embedded Systems, September 2007, pp.450-466.
|
[2] |
Wu W, Zhang L. LBlock: A lightweight block cipher. In Proc. the 9th International Conference on Applied Cryptography and Network Security, June 2011, pp.327-344.
|
[3] |
Gong Z, Nikova S, Law Y. KLEIN: A new family of lightweight block ciphers. In Proc. the 7th International Workshop on RFID Security and Privacy (RFIDSec), June 2011, pp.1-18.
|
[4] |
Shibutani K, Isobe T, Hiwatari H et al. Piccolo: An ultralightweight blockcipher. In Proc. the 13th International Workshop on Cryptographic Hardware and Embedded Systems, September 28-October 1, 2011, pp.342-357.
|
[5] |
Guo J, Peyrin T, Poschmann A et al. The LED block cipher. In Proc. the 13th International Workshop on Cryptographic Hardware and Embedded Systems, September 28-October 1, 2011, pp.326-341.
|
[6] |
Borghoff J, Canteaut A, Güneysu T et al. PRINCE — A low-latency block cipher for pervasive computing applications. In Proc. the 18th International Conference on the Theory and Application of Cryptology and Information Security, December 2012, pp.208-225.
|
[7] |
Beaulieu R, Shors D, Smith J et al. The SIMON and SPECK families of lightweight block ciphers. Cryptology ePrint Archive: Report 404, 2013. http://eprint.iacr.org/2013/404, April 2015.
|
[8] |
Abed F, List E, Lucks S et al. Differential and linear cryptanalysis of reduced-round SIMON. Cryptology ePrint Archive: Report 526, 2013. http://eprint.iacr.org/2013/526.pdf, April 2015.
|
[9] |
Alkhzaimi H, Lauridsen M. Cryptanalysis of the SIMON family of block ciphers. Cryptology ePrint Archive: Report 543, 2013. http://eprint.iacr.org/2013/543.pdf, April 2015.
|
[10] |
Abed F, List E, Lucks S et al. Cryptanalysis of the SPECK family of block ciphers. Cryptology ePrint Archive: Report 568, 2013. http://eprint.iacr.org/2013/568, April 2015.
|
[11] |
Alizadeh J, Bagheri N, Gauravaram P et al. Linear cryptanalysis of round reduced variants of SIMON. Cryptology ePrint Archive: Report 663, 2013. http://eprint.iacr.org/2013/663.pdf, April 2015.
|
[12] |
Abed F, List E, Lucks S et al. Differential cryptanalysis of reduced-round SIMON and SPECK. In Proc. the 21st International Workshop on Fast Software Encryption, March 2014, pp.525-545.
|
[13] |
Biryukov A, Roy A, Velichkov V. Differential analysis of block ciphers SIMON and SPECK. In Proc. the 21st International Workshop on Fast Software Encryption, March 2014, pp.546-570.
|
[14] |
Wang Q, Liu Z, Var?c? K et al. Cryptanalysis of reducedround SIMON32 and SIMON48. Cryptology ePrint Archive: Report 761, 2014. http://eprint.iacr.org/2014/761.pdf, April 2015.
|
[15] |
Bogdanov A, Rijmen V. Linear hulls with correlation zero and linear cryptanalysis of block ciphers. Cryptology ePrint Archive, Report 123, 2011. http://eprint.iacr.org/2011/123, Mar. 2011.
|
[16] |
Bogdanov A, Wang M. Zero correlation linear cryptanalysis with reduced data complexity. In Proc. the 19th International Workshop on Fast Software Encryption, March 2012, pp.29-48.
|
[17] |
Bogdanov A, Leander G, Nyberg K et al. Integral and multidimensional linear distinguishers with correlation zero. In Proc. the 18th International Conference on the Theory and Application of Cryptology and Information Security, December 2012, pp.244-261.
|
[18] |
Soleimany H, Nyberg K. Zero-correlation linear cryptanalysis of reduced-round LBlock. Designs, Codes and Cryptography, 2014, 73(2): 683-698.
|
[19] |
Biham E. On Matsui's linear cryptanalysis. In Proc. the Workshop on the Theory and Application of Cryptographic Techniques, May 1994, pp.341-355.
|
[20] |
Matsui M. Linear cryptoanalysis method for DES cipher. In Proc. the Workshop on the Theory and Application of Cryptographic Techniques, May 1993, pp.386-397.
|
[21] |
Bogdanov A, Rijmen V. Linear hulls with correlation zero and linear cryptanalysis of block ciphers. Designs, Codes and Cryptography, 2014, 70(3): 369-383.
|
[22] |
Harpes C, Kramer G G, Massey J L. A generalization of linear cryptanalysis and the applicability of Matsui's piling-up lemma. In Proc. the 14th Advances in Cryptology- Eurocrypt, May 1995, pp.24-38.
|
[1] | Yu-Chu Fang, Wen-Zhong Li, Yao Zeng, Qing-Ning Lu, Sang-Lu Lu. Pushing to the Limit: An Attention-Based Dual-Prune Approach for Highly-Compacted CNN Filter Pruning[J]. Journal of Computer Science and Technology, 2025, 40(3): 805-820. DOI: 10.1007/s11390-024-3536-3 |
[2] | Ying Liu, Hong-Ying Liu, Ke Xu, Meng Shen. A Family of Stable Multipath Dual Congestion Control Algorithms[J]. Journal of Computer Science and Technology, 2015, 30(6): 1274-1289. DOI: 10.1007/s11390-015-1598-y |
[3] | Jing-Yuan Zhao, Mei-Qin Wang, Long Wen. Improved Linear Cryptanalysis of CAST-256[J]. Journal of Computer Science and Technology, 2014, 29(6): 1134-1139. DOI: 10.1007/s11390-014-1496-8 |
[4] | Ming-Jie Liu, Jia-Zhe Chen. Improved Linear Attacks on the Chinese Block Cipher Standard[J]. Journal of Computer Science and Technology, 2014, 29(6): 1123-1133. DOI: 10.1007/s11390-014-1495-9 |
[5] | Rui Xue, Ning-Hui Li, Jiang-Tao Li. Algebraic Construction for Zero-Knowledge Sets[J]. Journal of Computer Science and Technology, 2008, 23(2): 166-175. |
[6] | Yi-Song Wang, Ming-Yi Zhang, Yu-Ping Shen. Consistency Property of Finite FC-Normal Logic Programs[J]. Journal of Computer Science and Technology, 2007, 22(4): 554-561. |
[7] | Chiou-Yng Lee, Jenn-Shyong Horng, I-Chang Jou. Low-Complexity Bit-Parallel Multiplier over GF(2m) Using Dual Basis Representation[J]. Journal of Computer Science and Technology, 2006, 21(6): 887-892. |
[8] | ZHAO Jianhua. Checking Timed Automata for Linear Duration Properties[J]. Journal of Computer Science and Technology, 2000, 15(5): 423-429. |
[9] | ZHAO Jianhua, Dang Van Hung. Checking Timed Automata for Linear Duration Properties[J]. Journal of Computer Science and Technology, 2000, 15(5). |
[10] | Zhang Xubo. Some Results on the Confluence Property of Combined Term Rewriting Systems[J]. Journal of Computer Science and Technology, 1991, 6(3): 291-295. |