1. National Institute of Standards and Technology,
  2. “Announcing Request for Candidate Algorithm
  3. Nominations for the Advanced Encryption Standard
  4. (AES),” Federal Register. vol. 62, Sep. 1997.
  5. Kayser and F. Richard, “Announcing request for candidate
  6. algorithm nominations for a new cryptographic hash
  7. algorithm (SHA-3) family,” Federal Register, vol. 72, p. 63,
  8. H. Wu and T. Huang, “The Authenticated Cipher Morus
  9. (v1),” 2015. Available:
  10. http://www.competitions.cr.yp.to/round2/morusv11.pdf,
  11. N. Mouha, Q. Wang, D. Gu, and B. Preneel, “Differential
  12. and Linear Cryptanalysis Using Mixed-Integer Linear
  13. Programming,” Information Security and Cryptology, pp.
  14. –76, 2011.
  15. S. Sun, L. Hu, M. Wang, P. Wang, K. Qiao, X. Ma, D. Shi,
  16. L. Song, and K. Fu, “Towards finding the best
  17. characteristics of some bit-oriented block ciphers and
  18. automatic enumeration of (related-key) differential and
  19. linear characteristics with predefined properties,”Cryptology ePrint Archive, Report 2014/747, 2014.
  20. Available: http://eprint. iacr.org/2014/747.
  21. S. Sun, L.Hu, P. Wang, K. Qiao, X. Ma, and L. Song,
  22. “Automatic security evaluation and (related-key)
  23. differential characteristic search: application to SIMON,
  24. PRESENT, LBlock, DES (L) and other bit-oriented block
  25. ciphers,” In Advances in Cryptology–Asiacrypt, Springer
  26. Berlin Heidelberg, pp. 158-178, 2014.
  27. D. Shi, L. Hu, S. Sun, L. Song, K. Qiao, and X. Ma,
  28. “Improved Linear (hull) Cryptanalysis of Round-reduced
  29. Versions of SIMON,” IACR Cryptology ePrint Archive,
  30. Report 2015/964, 2014. Available:
  31. http://eprint.iacr.org/2014/973.
  32. D. Shi, L. Hu, S. Sun, L. Song, “Improved Linear (hull)
  33. Cryptanalysis of Round-reduced Versions of KATAN,”
  34. IACR Cryptology e-Print Archive, Report 2015/964, 2015,
  35. Available: http://eprint.iacr.org/2015/964.
  36. ILOG, IBM, “CPLEX optimizer,” 2012.
  37. Available:http://www-01.ibm.
  38. Com/software/commerce/optimization/cplex-optimizer.
  39. M. Matsui, “Linear cryptanalysis method for DES cipher,”
  40. In Advances in Cryptology, Springer Berlin Heidelberg, pp.
  41. -397, 1993.