1Shannon C E. Communication Theory of Secrecy System [J]. Bell Syst Tech J, 1949, 28: 656-715.
2Zeng Xiang-yong, Zhang Huan-guo, Wang Li-na.Analysis of Design for S-box of AES [A]. Zhang Huan-guo, Qin Zhong-pin, Wang Li-na eds. The 3th Chinese Conference on Information and Communication Security[C]. Beijing: Science Press, 2003, 186-193(Ch).
3Daemen J. Cipher and Hash Function Design Strategies Based on Linear and Differential Cryptanal ysis[D]. Leuven: Katholieke Universiteit, 1995.
4Rijmen V, Daemen J, Bart Preneel, et aL. The Cipher SHARK[A]. Gollman D ed. Fast Software Encryption (LNCS 1039 ) [C]. Berlin: Springer-Verlag, 1996,99-112.
5Daemen J, Knudsen L R, Rijmen V. The Block Cipher Square [A]. Biham E ed. Fast Software Encryption(LNCS 1267) [C]. Berlin: Springer-Verlag, 1997,149-165.
6Daemen J, Rijmen V. The Design of Rijndael : AES-the Advanced Encryption Standard [M]. Berlin:Springer-Verlag, 2002.
7Sugita M, Kobara K, Uehara K, et al. Relationships Among Differential, Truncated Differential, Impossible Differentials Cryptanalysis Against Word-Oriented Block Cipher Like Rijndeal, E2 [OL]. http://csrc.nist. gov/encryption/aes/round2/con f3/ papers/32-msugita, pd f. 2002-05-06.