SCIENCE CHINA Information Sciences, Volume 61, Issue 1: 019101(2018) https://doi.org/10.1007/s11432-016-9184-y

## Integral cryptanalysis of SPN ciphers with binary permutations

• AcceptedJun 21, 2017
• PublishedNov 3, 2017
Share
Rating

### Acknowledgment

This work was supported by National Natural Science Foundation of China (Grant No. 61572521), Foundation of Science and Technology on Information Assurance Laboratory (Grant No. KJ-15-010), Scientific Research Project of Education Department of Hunan Province (Grant No. 17B214), Natural Science Foundation of Shaanxi Province (Grant No. 2016JQ6030).

Appendix A–D.

### References

[1] Knudsen L R, Wagner D. Integral cryptanalysis. In: Proceedings of International Workshop on Fast Software Encryption. Berlin/Heidelberg: Springer, 2002. 112--127. Google Scholar

[2] Zaba M R, Raddum H, Henricksen H, et al. Bit-pattern based integral attack. In: Proceedings of International Workshop on Fast Software Encryption. Berlin/Heidelberg: Springer, 2008. 363--381. Google Scholar

[3] Sun B, Qu L J, Li C. New cryptanalysis of block ciphers with low algebraic degree. In: Proceedings of International Workshop on Fast Software Encryption. Berlin/Heidelberg: Springer, 2009. 180--192. Google Scholar

[4] Sun B, Liu M C, Guo J, et al. Provable security evaluation of structures against impossible differential and zero correlation linear cryptanalysis. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin/Heidelberg: Springer, 2016. 196--213. Google Scholar

[5] Kwon D, Kim J, Park S, et al. New block cipher: ARIA. In: Proceedings of International Conference on Information Security and Cryptology. Berlin/Heidelberg: Springer, 2004. 432--445. Google Scholar

[6] Li P, Sun B, Li C. Integral cryptanalysis of ARIA. In: Proceedings of International Conference on Information Security and Cryptology. Berlin/Heidelberg: Springer, 2010. 1--14. Google Scholar

[7] Li Y J, Wu W L, Zhang L. Integral attacks on reduced-round ARIA block cipher. In: Proceedings of International Conference on Information Security, Practice and Experience. Berlin/Heidelberg: Springer, 2010. 19--29. Google Scholar

[8] Koo B, Jang H, Song J. On constructing of a $32\times32$ binary matrix as a diffusion layer for a $256$-bit block cipher. In: Proceedings of International Conference on Information Security and Cryptology. Berlin/Heidelberg: Springer, 2006. 51--64. Google Scholar

• #### 0

Citations

• Altmetric

Copyright 2020 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有