[1] |
Liu Botao, Peng Changgen, Wu Ruixue, Ding Hongfa, Xie Mingming.
Lightweight Format-Preserving Encryption Algorithm Oriented to Number
[J]. Journal of Computer Research and Development, 2019, 56(7): 1488-1497.
|
[2] |
Xie Gaoqi, Wei Hongru.
Impossible Differential Attack of Block Cipher ARIA
[J]. Journal of Computer Research and Development, 2018, 55(6): 1201-1210.
|
[3] |
Li Wei, Wu Yixin, Gu Dawu, Cao Shan, Liao Linfeng, Sun Li, Liu Ya, Liu Zhiqiang.
Ciphertext-Only Fault Analysis of the LBlock Lightweight Cipher
[J]. Journal of Computer Research and Development, 2018, 55(10): 2174-2184.
|
[4] |
Li Gongli, Dai Zibin, Xu Jinhui, Wang Shoucheng, Zhu Yufei, Feng Xiao.
Design of Block Cipher Processor Based on Stream Architecture
[J]. Journal of Computer Research and Development, 2017, 54(12): 2833-2842.
|
[5] |
Li Wei, Ge Chenyu, Gu Dawu, Liao Linfeng, Gao Zhiyong, Guo Zheng, Liu Ya, Liu Zhiqiang, Shi Xiujin.
Research on the LED Lightweight Cipher Against the Statistical Fault Analysis in Internet of Things
[J]. Journal of Computer Research and Development, 2017, 54(10): 2205-2214.
|
[6] |
Yin Jun, Ma Chuyan, Song Jian, Zeng Guang, Ma Chuangui.
Security Analysis of Lightweight Block Cipher ESF
[J]. Journal of Computer Research and Development, 2017, 54(10): 2224-2231.
|
[7] |
WangGaoli, GanNan.
A Meet-in-the-Middle Attack on 8-Round mCrypton-96
[J]. Journal of Computer Research and Development, 2016, 53(3): 666-673.
|
[8] |
Wei Hongru and Yin Guangli.
Related-Key Impossible Differential Cryptanalysis on LBlock
[J]. 计算机研究与发展, 2014, 51(7): 1520-1526.
|
[9] |
Gu Chunxiang, Zhu Yuefei, Zheng Yonghui, and Li Zheng.
An Efficient Rainbow Table Structure and Faster Cryptanalytic Time-Memory Trad-off Attack
[J]. Journal of Computer Research and Development, 2014, 51(5): 1089-1094.
|
[10] |
Zheng Yafei, Wei Hongru.
Biclique Cryptanalysis of Block Cipher SHACAL2
[J]. Journal of Computer Research and Development, 2014, 51(10): 2329-2335.
|
[11] |
Wang Xiaoming, Yao Guoxiang, and Liao Zhiwei.
Cryptanalysis and Modification of a Traitor Tracing Scheme
[J]. , 2013, 50(10): 2092-2099.
|
[12] |
Yu Xiaoli, , Wu Wenling, and Li Yanjun.
Integral Attack of Reduced-Round MIBS Block Cipher
[J]. , 2013, 50(10): 2117-2125.
|
[13] |
Zhao Xinjie, Wang Tao, Guo Shize, and Liu Huiying.
Cache Attacks on Block Ciphers
[J]. , 2012, 49(3): 453-468.
|
[14] |
Zhao Xinjie, Wang Tao, Guo Shize, and Liu Huiying.
Cache Attacks on Block Ciphers
[J]. , 2012, 49(3): 453-468.
|
[15] |
Yang Xiaohui, Dai Zibin, and Zhang Yongfu.
Research and Design of Reconfigurable Computing Targeted at Block Cipher Processing
[J]. , 2009, 46(6): 962-967.
|