logo

SCIENCE CHINA Information Sciences, Volume 60, Issue 9: 098102(2017) https://doi.org/10.1007/s11432-015-0376-x

New observation on division property

More info
  • ReceivedJun 7, 2016
  • AcceptedAug 12, 2016
  • PublishedDec 12, 2016

Abstract


Funded by

Foundation of Science and Technology on Information Assurance Laboratory(KJ-14-003)

Research Fund for the Doctoral Program of Higher Education of China(20121501120004)

National Natural Science Foundation of China(61402515)

National Natural Science Foundation of China(61672530)

Scientific Research Fund of Hunan Provincial Education Department(YB2014B001)


Acknowledgment

Acknowledgments

The authors thank Vincent Rijmen, Yosuke Todo and Xuan Shen for their helpful discussions. This work was supported by National Natural Science Foundation of China (Grant Nos. 61402515, 61672530), Foundation of Science and Technology on Information Assurance Laboratory (Grant No. KJ-14-003), Scientific Research Fund of Hunan Provincial Education Department (Grant No. YB2014B001), and Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20121501120004).


References

[1] Knudsen L R, Wagner D. Integral cryptanalysis. Lect Notes Comput Sci, 2002, 2365: 112-127 CrossRef Google Scholar

[2] Daemen J, Knudsen L R, Rijmen V. The block cipher square. Lect Notes Comput Sci, 1997, 1267: 149-165 CrossRef Google Scholar

[3] Lucks S. The saturation attack --- a bait for Twofish. Lect Notes Comput Sci, 2002, 2355: 1-15 CrossRef Google Scholar

[4] Biryukov A, Shamir A. Structural cryptanalysis of SASAS. Lect Notes Comput Sci, 2001, 2045: 394-405 Google Scholar

[5] Lai X. Higher order derivatives and differential cryptanalysis. Springer Int Ser Eng Comput Sci, 1994, 276: 227-233 Google Scholar

[6] Todo Y. Structural evaluation by generalized integral property. Lect Notes Comput Sci, 2015, 9056: 287-314 CrossRef Google Scholar

[7] Sun B, Liu Z, Rijmen V, et al. Links among impossible differential, integral and zero correlation linear cryptanalysis. Lect Notes Comput Sci, 2015, 9215: 95-115 CrossRef Google Scholar

[8] Data encryption standard. FIPS 46--3. In National Institute of Standards and Technology. http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf. Google Scholar

[9] Aoki K, Ichikawa T, Kanda M, et al. Camellia: a 128-bit block cipher suitable for multiple platforms. In: Proceedings of the 7th Annual International Workshop, Selected Areas in Cryptography, Ontario, 2000. 39--56. Google Scholar

Copyright 2019 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1