NICOLAS T,PIEPRZYK J.Cryptanalysis of block ciphers with overdefined systems of equations[C]∥Proceedings ofCryptology-ASIACRYPT2002.Berlin:Springer-Verlag,2002:13-19.
[2]
CARLOS C,LAURENT G.An Analysis of the XSL Algorithm[C]∥Proceedings of ASIACRYPT2005,Berlin:Springer-Verlag,2005:333-353.
[3]
BIHAM E,BIRYUKOV A,SHAMIR A.Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials[C]∥Proceedings of Eurocrypt’99.Berlin:Springer-Verlag,1999:12-23.
[4]
WANGER D.The boomerang attack[C]∥Proceedings of Fast Software Encryption’99.Berlin:Springer-Verlag,1999:156-170.
[5]
张蕾,吴文玲.对DES的Rectangle攻击和Boomerang攻击[J].软件学报,2008,10(19):2659-2665.ZHANG Lei,WU Wen-lin.Rectangle and boomerang attacks on DES[J].Journal of Software,2008,10(19):2659-2665.(in Chinese)
[6]
KELSEY J,KOHNO T,SCHNEIER B.Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent[C]∥proceedings of Fast Software Encryption 2000,Berlin:Springer-Verlag,2001:75-93.
[7]
BIHAM E,DUNKELMAN O,NELLER N.The rectangle attack-rectangling the Serpent[C]∥Proceedings of Eurocrypt’01.Berlin:Springer-Verlag,2001:340-357.
[8]
CLARK J A,JACOB J L,STEPNEY S.The design of S_boxs by simulated annealing[J].NewGeneration Computing,2005,23(3):219-231.
[9]
GUPTAK C,SARKAR P.Improved construction of nonlinear resilient S_boxes[J].IEEE Trnsactions on Information Theory,2005,51(1):339-348.
[10]
SANTIS A D,FERRARA A L,MASUCCI B.Enforcing the security of a time-bound hierarchical key assignment scheme[J].Information Sciences,2006,176(12):1684-1694.