Author:
Wang Zebin,Jin Chenhui,Cui Ting
Funder
Natural Science Foundation of Henan Province
Publisher
Springer Science and Business Media LLC
Reference19 articles.
1. Todo, Y., Leander, G., Sasaki, Y.: Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64. J. Cryptol 32, 1383–1422 (2019). https://doi.org/10.1007/s00145-018-9285-0
2. Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptology 4, 3–72 (1991). https://doi.org/10.1007/BF00630563
3. Matsui, M.: Linear cryptanalysis method for DES cipher. Advances in cryptology - EUROCRYPT ’93, EUROCRYPT 1993, LNCS 765, 386–397 (1993). https://doi.org/10.1007/3-540-48285-7_33
4. Grosso V., Leurent G., Standaert F. -X., Varici K., Journault A., Durvaux F., Gaspar L., Kerckhof S.: SCREAM v3. Submission to CAESAR competition (2015)
5. Grosso V., Leurent G., Standaert F. -X., Varici K., Journault A., Durvaux F., Gaspar L., Kerckhof S.: SCREAM v3. Submission to CAESAR competition (2014)