Square attack on the 14-round block cipher SMS4

被引:0
|
作者
Key Lab. of Computer Network and Information Security, Xidian Univ., Xi'an 710071, China [1 ]
机构
来源
Xi'an Dianzi Keji Daxue Xuebao | 2008年 / 1卷 / 105-109期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Impossible differential attack on the 17-round block cipher SMS4
    Chen, Jie
    Hu, Yu-Pu
    Zhang, Yue-Yu
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2008, 35 (03): : 455 - 458
  • [2] Cryptanalysis of reduced-round SMS4 block cipher
    Zhang, Lei
    Zhang, Wentao
    Wu, Wenling
    INFORMATION SECURITY AND PRIVACY, 2008, 5107 : 216 - 229
  • [3] Analysis of the SMS4 block cipher
    Liu, Fen
    Ji, Wen
    Hu, Lei
    Ding, Jintai
    Lv, Shuwang
    Pyshkin, Andrei
    Weinmann, Ralf-Philipp
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2007, 4586 : 158 - +
  • [4] Linearity within the SMS4 Block Cipher
    Z'aba, Muhammad Reza
    Simpson, Leonie
    Dawson, Ed
    Wong, Kenneth
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 248 - 265
  • [5] A quantum distinguisher for 7/8-round SMS4 block cipher
    Hodzic, S.
    Knudsen, L. R.
    QUANTUM INFORMATION PROCESSING, 2020, 19 (11)
  • [6] A quantum distinguisher for 7/8-round SMS4 block cipher
    S. Hodžić
    L. R. Knudsen
    Quantum Information Processing, 2020, 19
  • [7] Multiple Linear Cryptanalysis of Reduced-Round SMS4 Block Cipher
    Liu Zhiqiang
    Gu Dawu
    Zhang Jing
    CHINESE JOURNAL OF ELECTRONICS, 2010, 19 (03): : 389 - 393
  • [8] Implementation of SMS4 Block Cipher on FPGA
    Jin, Yier
    Shen, Haibin
    You, Rongquan
    2006 FIRST INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, 2006,
  • [9] Attacking reduced-round versions of the SMS4 block cipher in the Chinese WAPI standard
    Lu, Jiqiang
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2007, 4681 : 306 - 318
  • [10] Security of the SMS4 Block Cipher Against Differential Cryptanalysis
    Su, Bo-Zhan
    Wu, Wen-Ling
    Zhang, Wen-Tao
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2011, 26 (01) : 130 - 138