[1] |
Lo A,Grotevant H,Mcroy R.Privacy and confidentiality in adoption research:Perspectives from the Minnesota/Texas adoption research project[EB/OL].[2021-10-17].https://scholarworks.umass.edu/cgi/viewcontent.cgi?article=1228&context=rudd_conf.
|
[2] |
Sumra I A,Hasbullah H B,Ab Manan J.Attacks on security goals (confidentiality,integrity,availability) in VANET:A survey[M]∥Vehicular Ad-hoc Networks for Smart Cities. Singapore:Springer Singapore,2015:51-61.
|
[3] |
Bellare M,Namprempre C.Authenticated encryption:Relations among notions and analysis of the generic composition paradigm[J].Journal of Cryptology,2008,21(4):469-491.
|
[4] |
National Institute of Standards and Technology (NIST):Lightweight cryptography standardization process (2019) [EB/OL].[2021-10-17].https://csrc.nist.gov/projects/lightweight-cryptography.
|
[5] |
Goudarzi D, Jean J, Klbl S,et al.Pyjamask:Block cipher and authenticated encryption with highly efficient masked implementation[J].IACR Transactions on Symmetric Cryptology,2020,2020(S1):31-59.
|
[6] |
Xu Ze-yu. Automated analysis of the grouped cryptographic algorithm Pyjamask[D].Jinan:Shandong University,2020.(in Chinese)
|
[7] |
Tian W Q, Hu B.Integral cryptanalysis on two block ciphers Pyjamask and uBlock [J].IET Information Security,2020,14 (5):572-579.
|
[8] |
Liu Ya, Tang Wei-ming, Shen Zhi-yuan,et al.Impossible differential crytanalysis of lightweight block cipher Pyjamask[J].Application Research of Computers,2021,38(11):3428-3432.(in Chinese)
|
[9] |
Nandi M. Forging attacks on two authenticated encryption schemes COBRA and POET[C]∥Proc of International Conference on the Theory and Application of Cryptology and Information Security,2014:126-140.
|
[10] |
CAESAR—competition for authenticated encryption:Security, applicability and robustness[EB/OL].[2021-10-17].http://competitions.cr.yp.to/caesar.html.
|
[11] |
Leander G,Minaud B,Rnjom S.A generic approach to invariant subspace attacks:Cryptanalysis of Robin,iSCREAM and Zorro[C]∥Proc of International Conference on the Theo- ry & Applications of Cryptographic Techniques,2015:254-283.
|
[12] |
Tian Yu-dan,Wei Yong-zhuang.New forgery attack on the authenticated cipher SCREAM and iSCREAM[J].Chinese Journal of Network and Information Security,2016,2(1):60-64.(in Chinese)
|
[13] |
Du Zhi-bo, Wu Zhen,Wang Min,et al.Improved chosen-plaintext power analysis attack against SM4 at the round-output[J].Journal of Communications,2015,36(10):85-91.(in Chinese)
|
|
附中文参考文献:
|
[6] |
许泽雨.分组密码算法Pyjamask的自动化分析[D].济南:山东大学,2020.
|
[8] |
刘亚,唐伟明,沈致远,等.轻量级分组密码Pyjamask的不可能差分分析[J].计算机应用研究,2021,38(11):3428-3432.
|
[12] |
田玉丹,韦永壮.认证加密算法SCREAM及iSCREAM的新伪造攻击[J].网络与信息安全学报,2016,2(1):60-64.
|
[13] |
杜之波,吴震,王敏,等.针对SM4轮输出的改进型选择明文功耗分析攻击[J].通信学报,2015,36(10):85-91.
|