钱志鸿,王义君.物联网技术与应用研究[J].电子学报,2012,40(5):1023-1029. Qian Zhi-hong,Wang Yi-jun.IoT technology and application[J].Acta Electronica Sinica,2012,40(5):1023-1029.(in Chinese)
[2]
N Sklavos,et al.High speed networking security:design and implementation of two new DDP-based ciphers[J].Mobile Networks and Applications,2005,10:219-231.
[3]
Ding Lin,Guan Jie.Related-key chosen IV attack on K2*[J].Chinese Journal of Electronics,2011,20(2):365-369.
[4]
Liu Shu-sheng,et al.Improved related-key differential attacks on reduced-round LBlock[J].Information and Communications Security,2012,7618/2012:58-69.
[5]
Jinkeon Kang.Related-key attack on the MD-64 block cipher suitable for pervasive computing environments[A].Advanced Information Networking and Applications Workshops(WAINA)[C].IEEE Computer Society Washington,DC,USA,2012.726-731.
[6]
K C Zeng,et al.On the linear consistency test (LCT) in cryptanalysis and its applications[A].CRYPTO''89[C].LNCS,G.Brassard ed.,Springer-Verlag,1990.435,164-174.
[7]
王萼芳,石生明.高等代数[M].北京:高等教育出版社,2003:145-146.
[8]
A A Moldovyan,N A Moldovyan.A cipher based on data dependent permutations[J].Journal of Cryptology,2002,15(1):61-72.
[9]
Changhoon Lee,et al.Security analysis of pure DDP-based cipher proper for multimedia and ubiquitous device[J].Telecommunication System,2010,(44):267-279.
[10]
Jiali Choy,et al.AES variants secure against related-key differential and boomerang attacks[J].Lecture Notes in Computer Science,2011,6633:191-207.
[11]
Changhoon Lee,et al.Related-key differential attacks on Cobra-H64 and Cobra-H128[J].Lecture Notes in Computer Science,2005,3796:201-219.