• Article
  • | |
  • Metrics
  • |
  • Reference [6]
  • |
  • Related [20]
  • |
  • Cited by
  • | |
  • Comments
    Reference
    [1]Jakimoski G, Kocarev L. Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Transactions on Circuits and Systems-1: Fundamental Theory and Applications, 2001,48(2):163~169.
    [2]Lai X, Massey JL, Murphy S. Markov ciphers and differential cryptanalysis. In: Rueppel RA, ed. Advances in Cryptology--EUROCRYPT'91. LNCS 547, Berlin: Springer-Verlag, 1991. 17~38.
    [3]Nyberg K. Linear approximation of block ciphers. In: De Santis A, ed. Advances in Cryptology--EUROCRYPT'94. LNCS950, Berlin: Springer-Verlag, 1995. 439~444.
    [4]Knudsen LR. Practically secure Feistel ciphers. In: Anderson R, ed. Fast Software Encryption. LNCS 809, New York: Springer-Verlag, 1994. 211~221.
    [5]Kanda M. Practical security evaluation against differential and linear attacks for Feistel ciphers with SPN round function. In: Stinson DR, ed. Proceedings of the 7th Annual Workshop on Selected Areas in Cryptography. New York: Springer-Verlag, 2000. 168~179.
    [6]Hong S, Lee S, Lim J, Sung J, Cheon D. Provable security against differential and linear cryptanalysis for the SPN structure. In: Schneier B, ed. Fast Software Encryption 2000. LNCS 1978, New York: Springer-Verlag, 2000. 273~283.
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

张文涛,卿斯汉,吴文玲.一类基于混沌函数的分组密码的安全性评估.软件学报,2003,14(3):512-517

Copy
Share
Article Metrics
  • Abstract:3958
  • PDF: 4909
  • HTML: 0
  • Cited by: 0
History
  • Received:December 19,2001
  • Revised:December 19,2001
You are the first2033373Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063