共 31 条
- [1] Ankele Ralph, 2019, Selected Areas in Cryptography - SAC 2018. 25th International Conference. Revised Selected Papers: Lecture Notes in Computer Science (LNCS 11349), P163, DOI 10.1007/978-3-030-10970-7_8
- [2] Ankele Ralph, 2018, Applied Cryptography and Network Security. 16th International Conference, ACNS 2018. Proceedings: LNCS 10892, P459, DOI 10.1007/978-3-319-93387-0_24
- [3] Beaulieu R., 2013, IACR CRYPTOLOGY EPRI, V2013, P404
- [4] Biham E., 1991, Journal of Cryptology, V4, P3, DOI 10.1007/BF00630563
- [5] Biryukov Alex, 2014, Topics in Cryptology - CT-RSA 2014. The Cryptographers Track at the RSA Conference 2014. Proceedings: LNCS 8366, P227, DOI 10.1007/978-3-319-04852-9_12
- [6] Biryukov A., 2017, Cryptology ePrint Archive
- [7] Automatic Search for the Best Trails in ARX: Application to Block Cipher SPECK [J]. FAST SOFTWARE ENCRYPTION (FSE 2016), 2016, 9783 : 289 - 310
- [8] Differential Analysis of Block Ciphers SIMON and SPECK [J]. FAST SOFTWARE ENCRYPTION, FSE 2014, 2015, 8540 : 546 - 570
- [9] Design Strategies for ARX with Provable Bounds: SPARX and LAX [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 : 484 - 513