BUCCI M,LUZZI R.Design of testable random bit generators[C]// CHES 2005,Edinburgh,UK:Springer-Verlag,2005: 147-156.
[3]
YIN Yi-feng,LI Xin-she,HU Yu-pu.Fast S-box security mechanism research based on the polymorphic cipher[J]. Information Sciences,2008,178(6):1603-1610.
[4]
BIHAM E,SHAMIR A.Differential cryptanalysis of DES-like cryptosysterns[J].Journal of Cryptology,1991,4(1):3-72.
[5]
CLARK J A,JACOB J L,STEPNEY S.The design of S-boxes by simulated annealing[J].New Generation Computing, 2005,23(3):219-231.
[6]
GUPTA K C,SARKAR P.Improved construction of nonlinear resilient S-boxes[J].IEEE Transactions on Information Theory,2005,51(1):339-348.
[7]
MATSUI M.Linear cryptanalysis method for DES cipher[C]//Advances in Cryptology Eurocrypt' 93 Proc,Berlin: Springer-Verlag,1994:386-397.
[8]
李玉安,冯登国.一种实用的仿一次一密分组加密方案[J].北京邮电大学学报,2005,28(2):101-104. LI Yu-an,FENG Deng-guo.A practical one-time-pad-like block cipher scheme[J].Journal of Beijing University of Posts and Telecommunications,2005,28(2):101-104.(in Chinese)
[9]
饶妮妮.一种基于重组DNA技术的密码方案[J].电子学报,2004,32(7):1216-1218. RAO Ni-ni.A cryptosystem based on recombinant DNA technique[J].Acta Electronica Sinica,2004,32(7):1216-1218. (in Chinese)
[10]
ROELLGEN C B.Polymorphic cipher theory[EB/OL].(2003-03-20)[2004-05-27].http:// www.ciphers.de/.
[11]
GOLDREICH O.Foundations of cryptography basic tools[M].Cambridge:Press Syndicate of the University of Cambridge, 2001:75-89.
[12]
SANTIS A D,FERRARA A L,MASUCCI B.Enforcing the security of a time-bound hierarchical key assignment scheme [J].Information Sciences,2006,176(12):1684-1694.