共 26 条
[1]
[Anonymous], 2015, ADV MATER SCI ENG
[2]
Beaulieu R., 2013, IACR Cryptol. ePrint Arch., V2013, P404
[3]
Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE
[J].
FAST SOFTWARE ENCRYPTION, FSE 2015,
2015, 9054
:3-27
[4]
Biryukov A, 2009, LECT NOTES COMPUT SC, V5677, P231, DOI 10.1007/978-3-642-03356-8_14
[5]
Bogdanov A, 2007, LECT NOTES COMPUT SC, V4727, P450
[6]
Bogdanov A, 2011, LECT NOTES COMPUT SC, V6544, P229, DOI 10.1007/978-3-642-19574-7_16
[7]
Boura C., 2014, 2014279 CRYPT PRINT
[8]
Boura C, 2014, LECT NOTES COMPUT SC, V8873, P179, DOI 10.1007/978-3-662-45611-8_10
[9]
Daemen J., 2002, DESIGN RIJNDAEL AES, DOI DOI 10.1007/978-3-662-04722-4
[10]
Derbez P, 2013, LECT NOTES COMPUT SC, V7881, P371, DOI 10.1007/978-3-642-38348-9_23