National Institute of Standards and Technology,
“Announcing Request for Candidate Algorithm
Nominations for the Advanced Encryption Standard
(AES),” Federal Register. vol. 62, Sep. 1997.
Kayser and F. Richard, “Announcing request for candidate
algorithm nominations for a new cryptographic hash
algorithm (SHA-3) family,” Federal Register, vol. 72, p. 63,
H. Wu and T. Huang, “The Authenticated Cipher Morus
(v1),” 2015. Available:
N. Mouha, Q. Wang, D. Gu, and B. Preneel, “Differential
and Linear Cryptanalysis Using Mixed-Integer Linear
Programming,” Information Security and Cryptology, pp.
S. Sun, L. Hu, M. Wang, P. Wang, K. Qiao, X. Ma, D. Shi,
L. Song, and K. Fu, “Towards finding the best
characteristics of some bit-oriented block ciphers and
automatic enumeration of (related-key) differential and
linear characteristics with predefined properties,”Cryptology ePrint Archive, Report 2014/747, 2014.
Available: http://eprint. iacr.org/2014/747.
S. Sun, L.Hu, P. Wang, K. Qiao, X. Ma, and L. Song,
“Automatic security evaluation and (related-key)
differential characteristic search: application to SIMON,
PRESENT, LBlock, DES (L) and other bit-oriented block
ciphers,” In Advances in Cryptology–Asiacrypt, Springer
Berlin Heidelberg, pp. 158-178, 2014.
D. Shi, L. Hu, S. Sun, L. Song, K. Qiao, and X. Ma,
“Improved Linear (hull) Cryptanalysis of Round-reduced
Versions of SIMON,” IACR Cryptology ePrint Archive,
Report 2015/964, 2014. Available:
D. Shi, L. Hu, S. Sun, L. Song, “Improved Linear (hull)
Cryptanalysis of Round-reduced Versions of KATAN,”
IACR Cryptology e-Print Archive, Report 2015/964, 2015,
ILOG, IBM, “CPLEX optimizer,” 2012.
M. Matsui, “Linear cryptanalysis method for DES cipher,”
In Advances in Cryptology, Springer Berlin Heidelberg, pp.