[1] SHANNON C.Communication Theory of Secrecy System [J].Bell System Technical Journal,1949,28(4):656-715.[2] 吴文玲,冯登国,张文涛.分组密码的设计与分析 [M].第2版.北京:清华大学出版社,2009.[3] DAEMEN J,RIJMEN V.The Design of Rijndael [M].New York:Springer-Verlag,2002.[4] HEYS H M,TRAVARES S E.The Design of Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis [C]//Proceedings of 2nd ACM Conference on Computer and Communications Security,Fairfax,Virginia,1994:148-155.[5] HEYS H M,TRAVARES S E.The Design of Product Ciphers Resistant to Differential and Linear Cryptanalysis [J].Journal of Cryptology,1996,9(1):1-19.[6] 崔灵果,曹元大.一种SPN线性层的设计方法 [J].计算机工程,2005,31(20):8-12.[7] 韩海清,张焕国.分组密码中的P-置换的分支数研究 [J].小型微型计算机系统,2010,31(5):921-926.[8] HONG S,LEE S,LIM J,et al.Provable Security Against Differential and Linear Cryptanalysis for the SPN Structure [C]//Fast Software Encryption,Springer-Verlag,2001,LNCS 1978:273-283.[9] 崔灵果,曹元大.SPN分组密码中最优扩散层的构造与验证 [J].计算机应用,2005,25(4):856-858.[10] 郭艳珍,韩文报,赵龙,等.AES列混合变换 [J].解放军理工大学学报:自然科学版,2009,10(3):232-236. |