|
|
|
|
Список литературы
|
|
| |
| 1. |
Малышев Ф. М., “Двойственность разностного и линейного методов в криптографии”, Математические вопросы криптографии, 5:3 (2014), 35–47 |
| 2. |
Малышев Ф. М., Трифонов Д. И., “Рассеивающие свойства XSLP-шифров”, Математические вопросы криптографии, 7:3 (2016), 47–60 |
| 3. |
Barreto P. S. L. M., Rijmen V., “The Anubis Block Cipher”, NESSIE, 2000 (to appear) |
| 4. |
Biryukov A., Nikolic I., “Automatic search for related-key differential characteristics in byteoriented block ciphers: applications to AES, Camellia, Khazad and others”, Lect. Notes Comput. Sci., 6110, 2010, 322–344 |
| 5. |
Borst J., “The Block Cipher: GrandCru”, NESSIE, 2000 (to appear) |
| 6. |
Daemen J., Knudsen L., Rijmen V., “The Block Cipher Square”, Lect. Notes Comput. Sci., 1267, 1997, 149–165 |
| 7. |
Daemen J., Rijmen V., “The Block Cipher BKSQ”, Lect. Notes Comput. Sci., 1820, 2000, 236–245 |
| 8. |
Daemen J., Rijmen V., The Design of Rijndael: AES — The Advanced Encryption Standard, Springer, Heidelberg etc., 2002, 238 pp. |
| 9. |
Fouque P.-A., Jean J., Peyrin T., “Structural evaluation of AES and chosen-key distinguisher of 9-round AES-128”, Lect. Notes Comput. Sci., 8042, 2013, 183–203 |
| 10. |
Lim C., “A revised version of Crypton: Crypton v1.0”, Lect. Notes Comput. Sci., 1636, 1999, 31–45 |
| 11. |
Mouha N., Wang Q., Gu D., Preneel B., “Differential and linear cryptanalysis using mixedinteger linear programming”, Lect. Notes Comput. Sci., 7537, 2012, 57–76 |