REFERENCES

1. Beaulieu R, Shors D, Smith J, et al. The SIMON and SPECK families of lightweight block ciphers. IACR Cryptol ePrint Arch 2013: 404. Available from: http://eprint.iacr.org/2013/404.

2. Dinu D, Perrin L, Udovenko A, et al. Design strategies for ARX with provable bounds: sparx and LAX. In: Cheon JH, Takagi T, editors. Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part Ⅰ. vol. 10031 of Lecture Notes in Computer Science; 2016. pp. 484–513.

3. Bernstein DJ. The Salsa20 family of stream ciphers. Lectu Note Comput Sci 2008;4986: 179–90. Available from: http://dx.doi.org/10.1007/978-3-540-68351-3_8.

4. Bernstein DJ. ChaCha, a variant of Salsa20. Available from: https://cr.yp.to/chacha/chacha-20080120.pdf.

5. Beierle C, Biryukov A, dos Santos LC, et al. Alzette: A 64-Bit ARX-box - (Feat. CRAX and TRAX). In: Micciancio D, Ristenpart T, editors. Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part Ⅲ. vol. 12172 of Lecture Notes in Computer Science. Springer; 2020. pp. 419–48.

6. Beierle C, Biryukov A, dos Santos LC, et al. Lightweight AEAD and Hashing using the Sparkle Permutation Family. IACR Trans Symmetric Cryptol 2020;2020:208-61.

7. Mouha N, Mennink B, Herrewege AV, et al. Chaskey: An efficient MAC algorithm for 32-bit microcontrollers. In: Joux A, Youssef AM, editors. Selected Areas in Cryptography - SAC 2014 - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers. vol. 8781 of Lecture Notes in Computer Science. Springer; 2014. pp. 306–23.

8. Aumasson J, Bernstein DJ. SipHash: A fast short-input PRF. In: Galbraith SD, Nandi M, editors. Progress in Cryptology - INDOCRYPT 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings. vol. 7668 of Lecture Notes in Computer Science. Springer; 2012. pp. 489–508.

9. Aumasson JP, Henzen L, Meier W, Phan CW. SHA3 proposal BLAKE, 2008. Available from: https://www.scinapse.io/papers/200599792.

10. Callas J, Com J, Walker J. The Skein Hash Function Family 2010. Available from: https://www.schneier.com/academic/skein/.

11. Velichkov V, Mouha N, Cannière CD, Preneel B. UNAF: A special set of additive differences with application to the differential analysis of ARX. In: Canteaut A, editor. Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers. vol. 7549 of Lecture Notes in Computer Science. Springer; 2012. pp. 287–305.

12. Lipmaa H. On differential properties of pseudo-hadamard transform and related mappings. In: Menezes A, Sarkar P, editors. Progress in Cryptology - INDOCRYPT 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002. vol. 2551 of Lecture Notes in Computer Science. Springer; 2002. pp. 48–61.

13. Wallén J. Linear approximations of addition modulo 2n. In: Johansson T, editor. Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers. vol. 2887 of Lecture Notes in Computer Science. Springer; 2003. pp. 261–73.

14. Ashur T, Liu Y. Rotational cryptanalysis in the presence of constants. IACR Trans Symmetric Cryptol 2016;2016:57-70.

15. Mouha N, Velichkov V, Cannière CD, Preneel B. The differential analysis of S-functions. In: Biryukov A, Gong G, Stinson DR, editors. Selected Areas in Cryptography - 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers. vol. 6544 of Lecture Notes in Computer Science. Springer; 2010. pp. 36–56.

16. Biham E, Shamir A. Differential cryptanalysis of DES-like cryptosystems. In: Menezes A, Vanstone SA, editors. Advances in Cryptology - CRYPTO '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings. vol. 537 of Lecture Notes in Computer Science. Springer; 1990. pp. 2–21.

17. Biham E, Shamir A. Differential cryptanalysis of DES-like cryptosystems. J Cryptol 1991;4:3-72.

18. Lipmaa H, Moriai S. Efficient algorithms for computing differential properties of addition. In: Matsui M, editor. Fast Software Encryption, 8th International Workshop, FSE 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers. vol. 2355 of Lecture Notes in Computer Science. Springer; 2001. pp. 336–50.

19. Lipmaa H, Wallén J, Dumas P. On the additive differential probability of exclusive-or. In: Roy BK, Meier W, editors. Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers. vol. 3017 of Lecture Notes in Computer Science. Springer; 2004. pp. 317–31.

20. Velichkov V, Mouha N, Cannière CD, Preneel B. The additive differential probability of ARX. In: Joux A, editor. Fast Software Encryption - 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers. vol. 6733 of Lecture Notes in Computer Science. Springer; 2011. pp. 342–58.

21. Niu Z, Sun S, Liu Y, Li C. Rotational differential-linear distinguishers of ARX ciphers with arbitrary output linear masks. In: Dodis Y, Shrimpton T, editors. Advances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part Ⅰ. vol. 13507 of Lecture Notes in Computer Science. Springer; 2022. pp. 3–32.

Journal of Surveillance, Security and Safety
ISSN 2694-1015 (Online)
Follow Us

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/