References
1. Zeng G, Dong X D, Bornemann J. Reconfigurable feedback shift register based stream cipher for wireless sensor networks. IEEE Wireless Communications Letters, 2013, 2(5): 559 -562
2. Lafitte F, Olivier M, Dirk V. SAT based analysis of LTE stream cipher ZUC. Journal of Information Security and Applications, 2015(22): 54 -65
3. Dubrova E, Hell M. Espresso: A stream cipher for 5G wireless communication systems. Cryptography and Communications, 2017, 9(2): 273 -289
4. Zhang B, Xu C, Feng D G. Design and analysis of stream ciphers: Past, present and future directions. Journal of Cryptologic Research, 2016, 3(6): 527 -545 (in Chinese)
5. Hell M, Johansson T. Cryptanalysis of Achterbahn-128/80. IET Information Security, 2007, 11(2): 47 -52
6. Plasencia M. Cryptanalysis of Achterbahn-128/80. Proceedings of the 14th International Workshop on Fast Software Encryption (FSE‘07), March 26-28, 2007, Luxembourg, LNCS 4593, Berlin, Germany: Springer-Verlag, 2007: 73 -86
7. Plasencia M. Cryptanalysis of Achterbahn-128/80 with a new keystream limitation. Proceedings of Western European Workshop on Research in Cryptology ( WEWoRC‘07 ), July 4-6, 2007, Bochum, Germany, LNCS 4945, Berlin, Germany: Springer-Verlag, 2008: 142 -152
8. Sarkar S, Maitra S, Baksi A. Observing biases in the state: Case studies with Trivium and Trivia-SC. Designs, Codes and Cryptography, 2017, 82(1 -2): 351 -375
9. Banik S, Isobe T. Cryptanalysis of the full spritz stream cipher. Proceedings of the 23rd International Conference Fast Software Encryption (FSE‘16), March 20-23, 2016, Bochum, Germany, LNCS 9783, Berlin, Germany: Springer-Verlag, 2016: 63 -77
10. Joseph M, Sekar G, Balasubramanian R. Distinguishing attacks on ( ultra- ) light weight WG ciphers. International Workshop on Lightweight Cryptography for Security and Privacy (LightSec‘16), Sep 21-22, 2016, Aksaray, Turkey, LNCS 10098, Berlin, Germany: Springer-Verlag, 2017: 45 -59
11. Blondeau C, Peyrin T, Wang L. Known-key distinguisher on full present. Advances in Cryptology: Proceedings of the 35th International Cryptology Conference ( CRYPTO‘15), August 16-20, 2015, Santa Barbara, CA, USA, LNCS 9215, Berlin, Germany: Springer-Verlag, 2015: 455 -474
12. Iwamoto M, Peyrin T, Sasaki Y. Limited-birthday distinguishers for hash functions. Advances in Cryptology: Proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT‘13), December 1-5, 2013, Bengaluru, India, LNCS 8270, Berlin, Germany: Springer-Verlag, 2013: 504 -523
13. Canteaut A, Plasencia M. Parity-check relations on combination generators. IEEE Transactions on Information Theory, 2012, 58 (6): 3900 -3911
14. Li R, Jin C. Meet-in-the-middle attacks on 10-round AES-256. Designs, Codes and Cryptography, 2016, 80(3): 459 -471 |