[1]ECRYPT. Estream: ECRYPT stream cipher project, IST2002507932[EB/OL]. (20100116) [20120301]. http://www. ecrypt. eu.org/stream/.[2]Canniere C D, Preneel B.TRIVIUM specifications, ECRYPT stream cipher project report [EB/OL]. (20050301) [20100116]. http://www.ecrypt.eu.org/stream/.[3]〖JP2〗Sonmez M, Kara O.Linear approximations for 2round Trivium[C]//Proc First International Conference on Security of Information and Networks. Gazimagusa,North Cyprus: Trafford Publishing, 2007: 96105.[4]Maximov A, Biryukov A.Two trivial attacks on Trivium [C]//Carlisle M (Eds).Selected Areas in Cryptography 14th International Workshop. Ottawa, Canada: Springer, 2007: 3655.[5]PriemuthSchmid D, Biryukov A. Slid pairs in salsa 20 and Trivium[C] //Dipanwita Roy Chowdhury(Eds). INDOCRYPT, 2008. India: Springer, 2008:114.[6]Dinur I, Shamir A. Cube attacks on tweakable black box polynomials[J]. LNCS, 2009, 5479: 278299.[7]Pasalic E. Key differentiation attacks on stream ciphers[EBOL]. (20081205)[20100103]. http://eprint.iacr.org/〖HJ*5/8〗[8]孙国平,胡予濮,白生江.基于选择差分的Trivium 猜测攻击[J].计算机工程,2010,36(9):129133.SUN Guoping, HU Yupu, BAI Shengjiang.Guess attack on Trivium based on chosen differential[J]. Computer Engineering,2010,36(9):129133.[9]Biryukov A, Wagner D. Slide attacks[J]. LNCS, 1999, 1636:245259.[10]Kucuk O.Slide resynchronization attack on the initialization of grain 1.0[EB/OL].(20060201) [20100103]. http://www.ecrypt.eu.org/stream/papersdir/2006/044.ps. |