This is a preview of subscription content, log in to check access.
Buy single article
Instant access to the full article PDF.
Price includes VAT for USA
Knudsen L R, Wagner D. Integral cryptanalysis. Lect Notes Comput Sci, 2002, 2365: 112–127
Daemen J, Knudsen L R, Rijmen V. The block cipher square. Lect Notes Comput Sci, 1997, 1267: 149–165
Lucks S. The saturation attack — a bait for Twofish. Lect Notes Comput Sci, 2002, 2355: 1–15
Biryukov A, Shamir A. Structural cryptanalysis of SASAS. Lect Notes Comput Sci, 2001, 2045: 394–405
Lai X. Higher order derivatives and differential cryptanalysis. Springer Int Ser Eng Comput Sci, 1994, 276: 227–233
Todo Y. Structural evaluation by generalized integral property. Lect Notes Comput Sci, 2015, 9056: 287–314
Sun B, Liu Z, Rijmen V, et al. Links among impossible differential, integral and zero correlation linear cryptanalysis. Lect Notes Comput Sci, 2015, 9215: 95–115
Data encryption standard. FIPS 46–3. In National Institute of Standards and Technology. http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf
Aoki K, Ichikawa T, Kanda M, et al. Camellia: a 128-bit block cipher suitable for multiple platforms. In: Proceedings of the 7th Annual International Workshop, Selected Areas in Cryptography, Ontario, 2000. 39–56
The authors thank Vincent Rijmen, Yosuke Todo and Xuan Shen for their helpful discussions. This work was supported by National Natural Science Foundation of China (Grant Nos. 61402515, 61672530), Foundation of Science and Technology on Information Assurance Laboratory (Grant No. KJ-14-003), Scientific Research Fund of Hunan Provincial Education Department (Grant No. YB2014B001), and Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20121501120004).
The authors declare that they have no conflict of interest.
About this article
Cite this article
Sun, B., Hai, X., Zhang, W. et al. New observation on division property. Sci. China Inf. Sci. 60, 098102 (2017). https://doi.org/10.1007/s11432-015-0376-x