logo

SCIENCE CHINA Information Sciences, Volume 59, Issue 4: 049101(2016) https://doi.org/10.1007/s11432-016-5540-x

Biclique cryptanalysis using balanced complete bipartite subgraphs

More info
  • ReceivedAug 6, 2015
  • AcceptedDec 29, 2015
  • PublishedFeb 29, 2016

Abstract


Funded by

National Natural Science Foundation of China(61572028)

National Natural Science Foundation of China(61300204)

National Natural Science Foundation of China(61402280)

Natural Science Foundation of Guangdong(2015A030313630)

Natural Science Foundation of Guangdong(2014A030313439)

Natural Science Foundation of Guangdong(2013B010406008)

Distinguished Young Teachers of Guangdong(Yq2013051)

Project of Science and Technology of Guangzhou(2014J2200006)

. Weidong Qiu was also supported by the Ministry of Educations New Century Excellent Talents in University(NCET-12-0358)

Technology Innovation Research Program of the Shanghai Municipal Education Commission(12ZZ019)


Acknowledgment

Acknowledgments

This work was supported by National Natural Science Foundation of China (Grant Nos. 61572028, 61300204, 61402280), Natural Science Foundation of Guangdong (Grant Nos. 2015A030313630, 2014A030313439, 2013B010406008), Distinguished Young Teachers of Guangdong (Grant No. Yq2013051) and Project of Science and Technology of Guangzhou (Grant No. 2014J2200006). Weidong Qiu was also supported by the Ministry of Educations New Century Excellent Talents in University (Grant No. NCET-12-0358) and Technology Innovation Research Program of the Shanghai Municipal Education Commission (Grant No. 12ZZ019).


References

[1] Bogdanov A, Khovratovich D, Rechberger C. Biclique cryptanalysis of the full AES. In: Lee D, Wang X, eds. Advances in Cryptology-ASIACRYPT. Berlin: Springer, 2011. 344--371. Google Scholar

[2] Wang Y, Wu W, Yu X. Biclique cryptanalysis of reduced-round Piccolo block cipher. In: Ryan M, Smyth B, Wang G, eds. Information Security Practice and Experience. Berlin: Springer, 2012. 337--352. Google Scholar

[3] Shibutani K, Isobe T, Hiwatari H, et al. Piccolo: an ultra-lightweight blockcipher. In: Preneel B, Takagi T, eds. Cryptographic Hardware and Embedded Systems-CHES. Berlin: Springer, 2011. 342--357. Google Scholar

[4] Song J, Lee K, Lee H. Int J Comput Math, 2013, 90: :-2580 Google Scholar

[5] Abed F, Forler C, List E, et al. A framework for automated independent-biclique cryptanalysis. In: Moriai S, ed. Fast Software Encryption. Berlin: Springer, 2014. 561--581. Google Scholar

[6] Shakiba M, Dakhilalian M, Mala H. IACR Cryptology ePrint Archive, 2013, 2013: 141-2580 Google Scholar

[7] Lim C H, Korkishko T. mCrypton-a lightweight block cipher for security of low-cost RFID tags and sensors. In: Song J, Kwon T, Yung M, eds. Information Security Applications. Berlin: Springer, 2005. 243--258. Google Scholar

[8] Ahmadi S, Ahmadian Z, Mohajeri J, et al. IEEE Trans Inf Foren Secur, 2014, 9: 1641-1652 Google Scholar

[9] Huang J L, Lai X J. Sci China Inf Sci, 2014, 57: 072110-1652 Google Scholar

[10] Garey M R, Johnson D S. Computers and Intractability: A Guide to the Theory of NP-Completeness. San Francisco: W. H. Freeman, 1979. Google Scholar

Copyright 2020 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1