Author:
Yu Qinyuan,Wang Bin,Zhong Rongzhou,Jin Yanjun,Li Zhe,Huang Guodong,Jang Xiang,Jin Zhongxia
Publisher
Springer Science and Business Media LLC
Reference21 articles.
1. Biham E, Biryukov A, Shamir A (2005) Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials. J Cryptol 18(4):291–311
2. Bouillaguet C, Derbez P, Dunkelman O, Fouque P-A, Keller N, Rijmen V (2012) Low-data complexity attacks on AES. IEEE Trans Inf Theory 58(11):7002–7017
3. Knuth DE (1997) The art of computer programming (Vol 3). Pearson Education, London
4. Koo WK, Lee H, Kim YH, Lee DH (2008) Implementation and analysis of new lightweight cryptographic algorithm suitable for wireless sensor networks. Paper presented at the 2008 international conference on information security and assurance (isa 2008)
5. Li T, Wu H, Wang X, Bao F (2005) SenSec design technical report-TR v1. 1; InfoComm security department. Institute for InfoComm Research: Singapore