[1] Eisenbarth T, Paar C, Poschmann A, et al. A survey of lightweight cryptography implementations[J]. Design & Test of computers, 2007,24(6):522-533.
[2] Hong D, Sung J, Hong S, et al. HIGHT:a new block cipher suitable for low-resource device //CHES 2006. Springer-Verlag,LNCS,2006,4249: 46-59.
[3] Bogdanow A, Knudsen L R, Leander G, et al. PRESENT: AnUltra-LightweightBlock cipher //CHES 2007. Springer-Verlag,LNCS, 2007,4247:450-466.
[4] Leander G, Paar C, Poschmann A, et al. New lightweight DES variants //FSE 2007. Springer-Verlag, LNCS, 2007, 4593: 196-210.
[5] Chae H L, Tymur K. mCrypton—a lightweight block cipher for security of low-cost RFID tags and sensor //WISA 2005. Springer-Verlag,LNCS,2005,3786:243-258.
[6] Standaert F X, Piret G, Gershenfeld N, et al. SEA: a scalable encryption algorithm for small embedded applications //CARDIS 2006. Springer-Verlag, LNCS, 2006,3928: 222-236.
[7] Robshaw M J B. Searching for compact algorithms: CGEN //Vietcrypt 2006. Springer-Verlag, LNCS,2006,4341: 37-49.
[8] Wu W L, Zhang L. LBlock: a lightweight block cipher //ACNS 2011. Springer-Verlag, LNCS, 2011, 6715:327-344.
[9] Boneh D, DeMillo R A, Lipton R J. On the importance of checking cryptographic protocols for faults //EUROCRYPT ’97. LNCS, 1997, 1233: 37-51.
[10] Biham E, Shamir A. Differential fault analysis of secret key cryptosystems //Proceedings of Crypto’97. CS 0910.
[11] Mukhopadhyay D. An improved fault based attack of the advanced encryption standard //Africacrypt 2009. LNCS, 2009,5580: 421-434.
[12] Zhang L, Wu W L. Differential fault analysis on SMS4[J]. Chinese Journal of Computers, 2006, 29(9):1596-1602(in Chinese). 张蕾,吴文玲. SMS4密码算法的差分故障攻击[J].计算机学报,2006,29(9):1596-1602.
[13] Zhou Y B, Wu W L, Xu N N, et al. Differential fault attack on camellia[J].Chinese Journal of Electronics, 2009, 18(1):13-19.
[14] Adams C. The CAST-128 Encryption Algorithm.(1997-05).RFC 2144, http://www.faqs.org/rfcs/rfc2144.html.
[15] Ozen O, Varici K, Tezcan C, et al. Lightweight block ciphers revisited: cryptanalysis of reduced round PRESENT and HIGHT //ACISP 2009. Springer-Verlag,LNCS, 2009, 5594: 90-107.
[16] Zhang P, Sun B, Li C. Saturation attack on the block cipher HIGHT //CANS 2009. Springer-Verlag,LNCS, 2009, 5888: 76-86. |