[1] |
Li Min,Liu Zhe-li,You Xiao-ying, et al. Format-preserving encryption model for sensitive information[J].Acta Scientiarum Naturalium Universitatis Nankaiensis,2012,45(5):1-6.(in Chinese)
|
[2] |
Jia Chun-fu,Liu Zhe-li,Li Jing-wei,et al.A new integer FPE scheme based on Feistel network[C]∥
|
|
Proc of 2010 International Conference on Services Science, Management and Engineering,2012:637-644.
|
[3] |
Bellare M, Ristenpart T, Rogaway P, et al.Format-preserving encryption[C]∥Proc of the 16th International Workshop on Selected Areas in Cryptography,2009:295-312.
|
[4] |
Bellare M,Rogaway P,Spies T.The FFX mode of operation for format-preserving encryption[EB/OL].[2010-02-20].https://csrc.nist.gov/csrc/media/projects/block-cipher-techniques/documents/bcm/proposed-modes/ffx/ffx-spec.pdf.
|
[5] |
Schneier B, Kelsey J G. Unbalanced Feistel networks and block-cipher design[C]∥Proc of the 3rd International Workshop on Fast Software Encryption,1996:121-144.
|
[6] |
Morris B,Rogaway P,Stegers T.How to encipher messages on a small domain:Deterministic encryption and the thorp shuffle[C]∥Proc of the 29th Annual International Cryptology Conference,2009:286-302.
|
[7] |
Liu Zhe-li,Jia Chun-fu,Li Jing-wei.Research on the format-preserving encryption techniques[J].Journal of Software,2012,23(1):152-170.(in Chinese)
|
[8] |
Li Jing-wei,Jia Chun-fu,Liu Zhe-li,et al.FPE scheme based on k-splits Feistel network[J].Journal on Communications,2012,33(4):62-68.(in Chinese)
|
[9] |
Li Min,Jia Chun-fu,Li Jing-wei,et al.Format-preserving encryption for variable-length encoding character data[J].Journal of Jilin University(Engineering and Technology Edition),2012,42(5):1257-1261.(in Chinese)
|
[10] |
Bellare M,Hoang V T,Stefano T.Message-recovery attacks on Feistel-based format preserving encryption[C]∥Proc of the 23rd ACM
|
|
SIGSAC Conference on
|
|
Computer and Communications Security,2016:794-826.
|
[11] |
Wang Peng.Research and implementation on multi-type format-preserving encrytion techniques[D].Beijing:Beijing University of Posts and Telecommunications,2017.(in Chinese)
|
[12] |
Zhang Bai-hui.Research on format-preserving encryption for big data publishment[D].Beijing:Beijing University of Posts and Telecommunications,2018.(in Chinese)
|
[13] |
Bellare M,Hoang V T.Identity-based format-preserving encryption[C]∥Proc of the 24th ACM SIGSAC Conference on Computer and Communications Security,2017:1515-1532.
|
[14] |
Black J,Rogaway P.Ciphers with arbitrary finite domains[C]∥
|
|
Proc of the Cryptographer’s Track at the RSA Conference on Topics Cryptology,2002:114-130.
|
|
附中文参考文献:
|
[1] |
李敏,刘哲理,游晓莺,等.敏感信息的保留格式加密模型[J].南开大学学报(自然科学版),2012,45(5):1-6.
|
[7] |
刘哲理,贾春福,李经纬.保留格式加密技术研究[J].软件学报,2012,23(1):152-170.
|
[8] |
李经纬,贾春福,刘哲理,等.基于k-分割的Feistel FPE方案[J].通信学报,2012,33(4):62-68.
|
[9] |
李敏,贾春福,李经纬,等.变长编码字符型数据的保留格式加密[J].吉林大学学报(工学版),2012,42(5):1257-1261.
|
[11] |
王鹏.多类型数据保留格式加密技术的研究与实现[D].北京:北京邮电大学,2017.
|
[12] |
张百惠.面向大数据发布的保留格式加密技术研究[D].北京:北京邮电大学,2018.
|