[1]Matsui M. Linear cryptanalysis method for DES cipher[C]//Hellesth T. Advances in CryptologyEurocrypt 1993. Loftus:SpringerVerlag, 1993: 386397. [2]Doug W, Bruce S, Stefan L, et al. Helix: Fast encryption and authentication in a single cryptographic primitive [C]//Ross A. Fast Software Encryption 2003. Berlin: SpringerVerlag, 2003: 330347.[3]James M, Gurgen K, Melsik K, et al. Nomination of safer++ as candidate algorithm for the new european schemes for signatures, integrity, and encryption (NESSIE) [EB/OL]. (20060227)[20090507].http://www.cryptonessie.org.[4]David A, Scott F. The stream cipher LEVIATHAN[EB/OL]. (20070301)[20090507].http://www.cryptonessie.org.[5]Miyano H. Addend dependency of differential/linear probability of addition[J]. IEICE Transactions, 1998, E81A(1):106109.[6]Helger L, Shiho M. Efficient algorithms for computing differential properties of addition[C]//Mitsure M. Fast Software Encryption 2001. Yokohama:SpringerVerlag, 2002: 336350.[7]张龙, 吴文玲, 温巧燕. Mod 2n加运算与F2上异或运算差值的概率分布和递推公式[J]. 北京邮电大学学报, 2007, 30(1): 8589.ZHANG Long, WU Wenling, WEN Qiaoyan. Probability distribution and recursive formula of difference between mod 2n sum and XOR over F2[J]. Journal of Beijing University of Posts and Telecommunications, 2007, 30(1): 8589.[8]陈士伟, 金晨辉. 模2加整体逼近二元和三元模2n加的噪声函数分析[J]. 电子与信息学报,2008, 30(6):14451449.CHEN Shiwei, JIN Chenhui. Analysis of noise functions of macrocosm approximation of binary addition and tripe addition modulo 2n with XOR [J]. Journal of Electronics and Information Technology, 2008, 30(6): 14451449.[9]Wallen J. Linear approximations of addition modulo 2n[C]//Kaisa N. Fast Software Encryption 2008. Lausanne:SpringerVerlag, 2009: 261273.[10]Helger L. On differential properties of pseudohadamard transform and related mappings[C]//Alfred M. Progress in Cryptology Indocrypt2002. Hyderabad: SpringerVerlag, 2002: 4861.[11]Kaisa N, Johan W. Improved Linear distinguishers for SNOW 2.0[C]//Matthew J. Fast Software Encryption 2006. Graz:SpringerVerlag, 2007:144162. |