supported by National Natural Science Foundation of China (Grant No. 61572521);Foundation of Science and Technology on Information Assurance Laboratory (Grant No. KJ-15-010);Scientific Research Project of Education Department of Hunan Province (Grant No. 17B214);Natural Science Foundation of Shaanxi Province (Grant No. 2016JQ6030)
Dear editor,As one of the most powerful cryptanalytic vectors,integral cryptanalysis[1]exploits the simultaneous relationship between multiple encryptions.In,the integral of f(x)over some subset V(V is not necessar...
supported by National Basic Research Program of China (973 Program) (Grant No. 2013CB834205);National Natural Science Foundation of China (Grant Nos. 61602276, 61672516, 61303258, 61133013, 61572293);Strategic Priority Research Program of the Chinese Academy of Sciences (Grant No. XDA06010701);Program for New Century Excellent Talents in University of China (Grant No. NCET13-0350)
At Crypto 2015, Blondeau et al. showed a known-key analysis on the full PRESENT lightweight block cipher. Based on some of the best differential distinguishers, they introduced a meet in the middle(Mit M)layer to pr...