Journal of Shanghai Jiaotong University ›› 2013, Vol. 47 ›› Issue (07): 1131-1136.
• Radiao Electronics, Telecommunication Technology • Previous Articles Next Articles
Received:
2011-07-20
Online:
2013-07-30
Published:
2013-07-30
CLC Number:
ZHANG Zhongya1,2,GUAN Jie1. Differential Analysis of Stream Cipher Phelix[J]. Journal of Shanghai Jiaotong University, 2013, 47(07): 1131-1136.
[1]Whiting D, Schneier B, Lucks S, et al. Phelix: Fast encryption and authentication in a single cryptographic primitive[EB/OL]. [20110330]. http:∥www.ecrypt.eu.org/stream. [2]Wu H J, Preneel B. Differentiallinear attacks against the stream cipher phelix[J]. Lecture Notes in Computer Science, 2007, 4593: 87100. [3]Yaser E S, Hadi A. A chosenkey distinguishing attack on phelix[EB/OL]. [20110330]. http:∥www.ecrypt.eu.org/stream. [4]Boneh D, DeMillo R A, Lipton R J. On the importance of checking cryptographic protocols for faults[J]. Lecture Notes in Computer Science, 1997, 1233: 3751. [5]Biham E, Shamir A. Differential fault analysis of secret key cryptosystems[J]. Lecture Notes in Computer Science, 1997, 1294: 513525. [6]Hojsik M, Rudolf B. Differential fault analysis of trivium[J]. Lecture Notes in Computer Science, 2008, 5086: 158172. [7]Zhou Y B, Wu W L, Xu N N, et al. Differential fault attack on camellia[J]. Chinese Journal of Electronics, 2009, 18(1): 1319. [8]Li, W, Gu D W, Li J R, et al. Differential fault analysis on camellia[J]. The Journal of Systems and Software, 2010, 83(5): 844851. [9]赵新杰,王韬,郭世泽. 一种针对Camellia的改进差分故障分析[J]. 计算机学报, 2011(4): 613627. ZHAO Xinjie, WANG Tao, GUO Shize. An improved differential fault analysis on camellia[J]. Chinese Journal of Computers, 2011(4): 613627. [10]李玮,谷大武. 基于密钥编排故障的SMS4算法的差分故障分析[J]. 通信学报, 2008, 29(10): 135142. LI Wei, GU Dawu. Differential fault analysis on the SMS4 cipher by inducing faults to the key schedule[J]. Journal on Communications, 2008, 29(10): 135142. [11]魏悦川,李琳,李瑞林,等. SHACAL2算法的差分故障攻击[J]. 电子与信息学报, 2010, 32(2): 318322. WEI Yuechuan, LI Lin, LI Ruilin, et al. Differential fault analysis on SHACAL2[J]. Journal of Electronics & Information Technology, 2010, 32(2): 318322. [12]李琳,李瑞林,谢端强,等. KeeLoq和SHACAL1算法的差分故障攻击[J]. 武汉大学学报:理学版, 2008, 54(5): 507512. LI Lin, LI Ruilin, XIE Duanqiang, et al. Differential fault analysis on keeLoq and SHACAL1[J]. Journal of Wuhan University:Natural Science Edition, 2008, 54(5): 507512. [13]Yukiyasu T, Terno S, Hiroyasu K, et al. Differential cryptanalysis of Salsa20/8[C]∥SASC2007. Bochum: Stream Ciphers Revisited, Workshop Record, 2007: 3950. [14]李申华. 对称密码算法AIRA和SALSA20的安全性分析[D]. 济南: 山东大学密码技术与信息安全教育部重点实验室, 2008. |
[1] | HOU Yuguan, HAN Yuanpeng, XIE Jinyue, MAO Xingpeng. A Radar DOA Tracking Method for Multiple Targets Based on SDE Model [J]. Air & Space Defense, 2021, 4(1): 41-46. |
[2] | LIU Chenzhengyi (刘陈正轶), ZHAO Jingwei (赵经纬), LIU Guohang (刘国航), GAO Yuanning (高远宁), GAO Xiaofeng (高晓沨). D2EA: Depict the Epidemic Picture of COVID-19 [J]. J Shanghai Jiaotong Univ Sci, 2020, 25(2): 165-176. |
[3] | HAO Lili1,2 (郝丽丽), LI Xiaoyan1* (李晓艳), LIU Song1 (刘松), JIANG Wei1 (蒋威). Adomian’s Method Applied to Solve Ordinary and Partial Fractional Differential Equations [J]. Journal of shanghai Jiaotong University (Science), 2017, 22(3): 371-376. |
[4] | CHEN Xiao1* (陈潇), THOMAS Nigel2, DING Jie3 (丁 杰). Performance Modelling of Patient Flow Scheduling Through a Formal Method [J]. Journal of shanghai Jiaotong University (Science), 2017, 22(1): 66-071. |
[5] | GAO Leia,XIE Fujib. Mixed Finite Element Methods for Elliptic Partial Differential Equations with Random Data [J]. Journal of Shanghai Jiaotong University, 2016, 50(04): 625-630. |
[6] | JIN Jin1,ZHAO Haolan2. Convergence Exponent of Small Function Points for Solutions of Higher Order Differential Equations [J]. Journal of Shanghai Jiaotong University, 2016, 50(04): 631-635. |
[7] | SUN Wenlong1,GUAN Jie1. Algebraic Attacks on Trivium-Like Stream Ciphers [J]. Journal of Shanghai Jiaotong University, 2014, 48(10): 1434-1439. |
[8] | LI Xiuzhi,TAN Jun,JIA Songmin,ZHAO Guanrong,YIN Xiaolin. An Improved Optical Flow Estimation Method Based on Structure-Texture Decomposition and Multiple Grid Method [J]. Journal of Shanghai Jiaotong University, 2014, 48(07): 959-964. |
[9] | ZHANG Wen-ying1,2 (张文英), LIU Feng1* (刘枫), LIU Xuan1 (刘宣), MENG Shuai1 (孟帅). Differential Fault Analysis and Meet-in-the-Middle Attack on the Block Cipher KATAN32 [J]. Journal of shanghai Jiaotong University (Science), 2013, 18(2): 147-152. |
[10] | WANG Xiaoduan1,LIU Shuxin2,LIU Manhua1. Fingerprint Singular-point Detection Based on Mathematical Model Analysis [J]. Journal of Shanghai Jiaotong University, 2013, 47(08): 1222-1226. |
[11] | JIN Jin. Growth of Solutions of Higher Order Linear Differential Equations and Its Small Functions [J]. Journal of Shanghai Jiaotong University, 2013, 47(07): 1155-1159. |
[12] | CHEN Tao-1, YANG Xuan-2, DAI Zi-Bin-1, LI Wei-1, CHEN Xun-1. Design of a Reconfigurable Parallel Nonlinear Feedback Shift Register Structure Targeted at Stream Cipher [J]. Journal of Shanghai Jiaotong University, 2013, 47(01): 28-32. |
[13] | RAN Qi-Kang-a, b . BSDEs and Viscosity Solutions of the Associated System with Partial Integro-Differential Equations [J]. Journal of Shanghai Jiaotong University, 2012, 46(09): 1522-1528. |
[14] | ZHANG Zhong-Ya, GUAN Jie. Differential Fault Analysis on the Stream Cipher LEX [J]. Journal of Shanghai Jiaotong University, 2012, 46(06): 865-869. |
[15] | WANG Jing-Jing, CHEN Ke-Fei. Improvement of Discrete Fourier Transform Attack [J]. Journal of Shanghai Jiaotong University, 2012, 46(02): 285-288. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||