Journal of Shanghai Jiaotong University ›› 2011, Vol. 45 ›› Issue (07): 1063-1067.
• Radiao Electronics, Telecommunication Technology • Previous Articles Next Articles
ZHANG Lei, GUO Jian-Sheng
Received:2010-08-23
Online:2011-07-29
Published:2011-07-29
CLC Number:
ZHANG Lei, GUO Jian-Sheng. Impossible Differential Cryptanalysis of ARIA[J]. Journal of Shanghai Jiaotong University, 2011, 45(07): 1063-1067.
| [1]Daesung K, Jaesung K, Sangwoo P, et al. New block cipher: ARIA[C]//Information Security and Cryptology (ICISC 2003). LNCS 2971. Seoul: SpringerVerlag Press, 2003: 432445.[2]李刚, 胡予濮, 李洁. 低轮ARIA的不可能差分[J]. 计算机研究与发展, 2006, 43(增刊): 244248.LI Gang, HU Yupu, LI Jie. Impossible differential cryptanalysis on reduced ARIA[J]. Journal of Computer Research and Development, 2006, 43(Supl.): 244248.[3]Wu W L, Zhang W T, Feng D G. Impossible differential cryptanalysis of reducedround ARIA and Camellia[J]. Journal of Computer Science and Technology, 2007, 22(3): 449456.[4]Zhang P, Li R L, Sun B, et al. New impossible differential cryptanalysis of ARIA[EB/OL]. (2008)[20100801]. http://eprint.iacr.org/2008/227.[5]李申华. 对称密码算法ARIA和Salsa20的安全性分析[D]. 济南: 山东大学数学与科学学院, 2008.[6]Ewan F, Michael G, Stefan L. Attacking reduced rounds of the ARIA block cipher[EB/OL]. (2009)[20100801]. http://eprint,iacr.org/2009/334.[7]Alex B, Christophe D, Joseph L, et al. Security and performance analysis of ARIA. Version 1.2[EB/OL]. (20030107)[20100801].http://www.nsri.re.kr/ARIA/doc.[8]Li Y J, Wu W L, Zhang L. Integral attacks on reducedround ARIA block cipher[C]//ISPEC 2010. LNCS 6047. Seoul: SpringerVerlag, 2010: 1929.[9]Tang X H, Sun B, Li R L, et al. A meetinthemiddle attack on ARIA[EB/OL]. (2010)[20100801]. http: // www.eprint.org/2010/168.pdf.[10]Kim J, Hong S, Sung J, et al. Impossible differential cryptanalysis for block cipher structures[C]//Indocrypt 2003. LNCS 2904. New Delhi: SpringerVerlag Press, 2003: 8296.[11]吴文玲, 张蕾. 不可能差分密码分析研究进展[J]. 系统科学与数学, 2008, 28(8): 971983.WU Wenling, ZHANG Lei. The stateoftheart of research on impossible differential cryptanalysis[J]. Journal of System Science and Mathematical Sciences, 2008, 28(8): 971983.[12]Tsunoo Y, Tsujihara E, Shigeri M, et al. Impossible differential cryptanalysis of CLEFIA[C]//FSE 2008. LNCS 5086. Switzerland: SpringerVerlag Press, 2008: 289302. |
| [1] | NIU Zhihua, YUAN Can, KONG Deyu. A Hybrid Genetic Algorithm for Computing the k-Error Linear Complexity of Periodic Sequences [J]. Journal of Shanghai Jiaotong University, 2020, 54(6): 599-606. |
| [2] | JENG Fuh-gwoa (郑富国), LIN Kai-siangb (林恺翔), LIN Chih-hungc (林志鸿), CHEN Tzung-herb*(陈宗和). Visual Multi-Secret Sharing with Friendliness [J]. Journal of shanghai Jiaotong University (Science), 2014, 19(4): 455-465. |
| [3] | SUN Jin1,2,HU Yupu2. Fully Secure Anonymous Identity-Based Broadcast Encryption Scheme [J]. Journal of Shanghai Jiaotong University, 2013, 47(07): 1103-1108. |
| [4] | SHEN Zhong-hua (沈忠华), YU Xiu-yuan (于秀源) . Threshold Signature Scheme with Threshold Verification Based on Multivariate Linear Polynomial [J]. Journal of shanghai Jiaotong University (Science), 2011, 16(5): 551-556. |
| [5] | Qin H.-W.; Zhu X.-H.; Dai Y.-W.. Identity-based threshold decryption on access structure [J]. J Shanghai Jiaotong Univ Sci, 2011, 16(4): 485-489. |
| [6] |
ZHANG Lei,CAO Zhenfu . An AttributeBased Encryption Scheme Suitable for Distributed Network [J]. Journal of Shanghai Jiaotong University, 2010, 44(11): 1507-1512. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||