[1]Whiting D, Schneier B, Lucks S, et al. Phelix: Fast encryption and authentication in a single cryptographic primitive[EB/OL]. [20110330]. http:∥www.ecrypt.eu.org/stream. [2]Wu H J, Preneel B. Differentiallinear attacks against the stream cipher phelix[J]. Lecture Notes in Computer Science, 2007, 4593: 87100. [3]Yaser E S, Hadi A. A chosenkey distinguishing attack on phelix[EB/OL]. [20110330]. http:∥www.ecrypt.eu.org/stream. [4]Boneh D, DeMillo R A, Lipton R J. On the importance of checking cryptographic protocols for faults[J]. Lecture Notes in Computer Science, 1997, 1233: 3751. [5]Biham E, Shamir A. Differential fault analysis of secret key cryptosystems[J]. Lecture Notes in Computer Science, 1997, 1294: 513525. [6]Hojsik M, Rudolf B. Differential fault analysis of trivium[J]. Lecture Notes in Computer Science, 2008, 5086: 158172. [7]Zhou Y B, Wu W L, Xu N N, et al. Differential fault attack on camellia[J]. Chinese Journal of Electronics, 2009, 18(1): 1319. [8]Li, W, Gu D W, Li J R, et al. Differential fault analysis on camellia[J]. The Journal of Systems and Software, 2010, 83(5): 844851. [9]赵新杰,王韬,郭世泽. 一种针对Camellia的改进差分故障分析[J]. 计算机学报, 2011(4): 613627. ZHAO Xinjie, WANG Tao, GUO Shize. An improved differential fault analysis on camellia[J]. Chinese Journal of Computers, 2011(4): 613627. [10]李玮,谷大武. 基于密钥编排故障的SMS4算法的差分故障分析[J]. 通信学报, 2008, 29(10): 135142. LI Wei, GU Dawu. Differential fault analysis on the SMS4 cipher by inducing faults to the key schedule[J]. Journal on Communications, 2008, 29(10): 135142. [11]魏悦川,李琳,李瑞林,等. SHACAL2算法的差分故障攻击[J]. 电子与信息学报, 2010, 32(2): 318322. WEI Yuechuan, LI Lin, LI Ruilin, et al. Differential fault analysis on SHACAL2[J]. Journal of Electronics & Information Technology, 2010, 32(2): 318322. [12]李琳,李瑞林,谢端强,等. KeeLoq和SHACAL1算法的差分故障攻击[J]. 武汉大学学报:理学版, 2008, 54(5): 507512. LI Lin, LI Ruilin, XIE Duanqiang, et al. Differential fault analysis on keeLoq and SHACAL1[J]. Journal of Wuhan University:Natural Science Edition, 2008, 54(5): 507512. [13]Yukiyasu T, Terno S, Hiroyasu K, et al. Differential cryptanalysis of Salsa20/8[C]∥SASC2007. Bochum: Stream Ciphers Revisited, Workshop Record, 2007: 3950. [14]李申华. 对称密码算法AIRA和SALSA20的安全性分析[D]. 济南: 山东大学密码技术与信息安全教育部重点实验室, 2008. |