1496
算机研究与 展2019,56(7)
Bellare
[10]
[11]
[12]
M。Hoang
T.Identity— based format— preserving
相加、取模lo运算,大大提高了算法的安全性,
of the 24th
SIGSAC Conf
encryption[c]/]Proc
并且解决了
足性的
的保形Prefix型算法存在安全不
and Communications
York:ACM,
attacks
S.Message— recovery
Computer
Security.New
以及不能加密
理
的数字型数据.
其他 量
2017:1515-1532
在算法中,将
量
PRESENT密
T。Tessaro
Bellare
M,Hoang
分
密
来构造置 表,也是可以达到 好的效
果,所以本算法是具有通用价
未来 行探究保形加密算法中有关密 管理的
以及如何 更高效、低 源的 保形加
密算法在 源受限的物 行运用.
format
of
on feistel— based
preserving encryption[c]//Proc
ACM SIGSAC Conf
and
.
the 23rd
Computer
Communications Security.New York:ACM,2016:444-455
Durak
F
the FF3
B.Vaudenay S.Breaking
standard small
format— preserving
10402:
量
encryption
domains[G]/]LNCS
网
端
Advances in
Cryptology(CRYPT()2017).Berlin:Springer,
2017:679-707
文
献
参
考
T.Tessaro S,Ni T.The
of sma[I domains:
[13] Hoang
NCS
New attacks
format— preserving encryption[G]肌/I
Cao Zhenfu.New
of information
[1
3
development
security--For
Research and
in
10991:Advances
Springer,2018:221— 251
[14] Zou
2018).Berlin:
based
unwei,Wang Peng,Luo Hong.Improved prefix
Cryptology(CRYPT0
the 60th
of Journal of
anniversary
Computer
of
Research and
Computer
Development[J3.Journal
J
Chinese)
Development,2019,56(1):131— 137(in
(曹珍富.信息安全的新 展— — 算机研究与 展》
for Chinese
encryption
names[J].China
E B.Nechvatal J R,et a1.Advanced
J,Barker
format— preserving
《
Communications,2018.15(3):78— 90
刊六十周年而作[J]. 算机研究与 展,2019,56(1):131-
137)
Dworkin
M
[15]
[16]
standard(AES).FIPS PUB
197[R].
encryption
A,Knudsen
L R.Leander G,et a1.PRESENT:
C2]Bogdanov
An
for
Sciences and
Computer
Gaithersburg.MD:Institute
block
of
4727:Proc
ultra— lightweight
cipher[G]//1,NCS
Cryptographic
Bureau of Standards,2001
Technology.National
the 9th Int
Hardware and
Workshop
S
T.et
K.Peyrin
small
a1.GIFT:A
Banik
S,Pandey
towards
Embedded
450-466
Systems(CHES 2007).Berlin:Springer.2007:
the limit of
lightweight encryption
present
reaching
of the 19th Int
10529:Proc
[G]//i。NCS
Cryptographic
Workshop
J,Kolbl S。et a1.The SKINNY
and its variant
low— latency
of
family
[3]Beierle c,Jean
Hardware and Embedded
Systems(CHES
block
MANTIS[G]//
ciphers
in
2016).
2017).Berlin:Springer,2017:32卜345
Wentao,Bao Zhenzhen.Lin
LNCS 9815:Advances
Cryptology(CRYPT0
a1.
[17] Zhang
Dongdai.et
Berlin:Springer· 2016:123— 153
Botao,Zhou
new
[4]Li
Yimeng,et a1.SFN:A
RECTANGI,E:A bit— slice
block
suitable
Lang,Liu
lightweight
cipher
block
lightweight
cipher[J].Microprocessors 8.Microsystems。
for
multiple platforms[J].Science
China Information
2018,60:138-150
Sciences.2015,58(12):l— 15.doi:10.1007/s11432— 015—
5459— 7
Chunfu,Li
on the format—
of Software,
[5]Liu Zheli,Jia
Jingwei.Research
preserving encryption techniques[J].Journal
a1.The LED block
T,Poschmann A,et
Guo
[i8]
Jian,Peyrin
cipher[G]//LNCS
Hardware and Embedded
Chinese)
2012,23(1):152— 170(in
(刘哲理, 春福,李
69 17:Proc of the 1 3th Int
Workshop
.保留格式加密技 研究[J].
件
Cryptographic
Systems(CHES
学
,2012,23(1):152-170)
2011).Berlin:Springer,2011:326— 341
Sciences and
for
[6]Institute
Computer
Technology,National
Li
new ultra—
[19]
[203
[2i]
Lang,1.iu Botao,Wang Hui.QTL:A
Bureau of Standards.Guidelines for
and
implementing
using
74[R].
block
lightweight
cipher[J].Microprocessors&Microsystems,
the NBS data
standard,FIPS PUB
encryption
2016,45:45-55
for
Sciences and
with
finite domains
arbitrary
Gaithersburg.MD:Institute
Computer
Cho Y.Linear
J
of reduced— round PRESENT
at the RSA Conf
cryptanalysis
Bureau of Standards。198l
Technology.National
Black
[G]//I。NCS 5985:cryptographers’Track
[73
J,Rogaway P.Ciphers
(CT— RSA
Blondeau
2010).Berlin:Springer.2010:302— 317
at the RSA Conf
[G]//1,NCS 2271:Cryptographers’Track
(CT— RSA
K.Links between truncated differential
C,Nyberg
2002).Berlin:Springer,2002:114一130
P,et a1.Format—
and multidimensional linear
attack
of block
and
properties
ciphers
[8]Bellare M,Ristenpart
T,Rogaway
8441:Advances
of the
1
6th Int
2009).
underlying
complexities[G]//LNCS
5867:Proc
preserving encryption[G]//I。NCS
Selected Areas in
in
Cryptology(EUROCRYPT 2014).Berlin:Springer,
Workshop
Cryptography(SAC
2014:165-182
Berlin:Springer,2009:295— 312
Chunfu,IAu Zheli,I。i
a1.A new
FPE
[223
Lei.Zhang Shaowu.FFT— based multidimensional
Zheng
[9]Jia
Jingwei,et
integer
scheme based
the 2nd Int
feistel
of
linear attack
PRESENT
the 2-bit-fixed characteristic
using
network[G]//LNEE 155:Proc
Electric and
Conf
Electronics(EEIC 2012).
Networks,2016.8(18):
[J].Security&Communication
3535-3545
1
2:637— 644
Berlin:Springer。20
万方数据
全部评论(0)