Funder
Youth Foundation of South China Normal University
National Natural Science Foundation of China
National Key R &D Program of China
Youth Innovation Promotion Association of the Chinese Academy of Sciences
National Key R &D Program of Chin
Publisher
Springer Science and Business Media LLC
Reference35 articles.
1. Ahmadian Z., Rasoolzadeh S., Salmasizadeh M., Aref M.R.: Automated dynamic cube attack on block ciphers: cryptanalysis of SIMON and KATAN. In: IACR Cryptology ePrint Archive (2015). http://eprint.iacr.org/2015/040.
2. Alzakari S.A., Vora P.L.: Linear and partly-pseudo-linear cryptanalysis of reduced-round SPARX cipher. In: Batina, L., Li, G. (eds.) Applications and Techniques in Information Security—11th International Conference, ATIS 2020, 12–13 November 2020, Proceedings. Communications in Computer and Information Science, vol 1338, pp. 108–121. Springer, Brisbane (2020). https://doi.org/10.1007/978-981-33-4706-9_8.
3. Bard G.V., Courtois Jr N.T., Nakahara J., Sepehrdad P., Zhang B.: Algebraic, AIDA/cube and side channel analysis of KATAN family of block ciphers. In: Gong, G., Gupta, K.C. (eds) Progress in Cryptology—INDOCRYPT 2010—11th International Conference on Cryptology in India, 12–15 December 2010. Proceedings. Lecture Notes in Computer Science, vol 6498, pp. 176–196. Springer, Hyderabad (2010). https://doi.org/10.1007/978-3-642-17401-8_14.
4. Biryukov A., Teh J.S., Udovenko A.: Advancing the meet-in-the-filter technique: applications to CHAM and KATAN. In: IACR Cryptology ePrint Archive (2023). https://eprint.iacr.org/2023/851.
5. Biryukov A., Cannière C.D., Quisquater M.: On multiple linear approximations. In: Franklin, M.K. (ed) Advances in Cryptology—CRYPTO 2004, 24th Annual International Cryptology Conference, 15–19 August 2004, Proceedings. Lecture Notes in Computer Science, vol 3152, pp. 1–22. Springer, Santa Barbara (2004). https://doi.org/10.1007/978-3-540-28628-8_1.