Skip to main content
Log in

Structure attack on full-round DBST

  • Letter
  • Published:
Frontiers of Computer Science Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Yan L, Li L, Guo Y. DBST: a lightweight block cipher based on dynamic S-box. Frontiers of Computer Science, 2023, 17(3): 173805

    Article  Google Scholar 

  2. Cui T T, Wang M Q, Fan Y H, Hu K, Fu Y, Huang L M. Ballet: a software-friendly block cipher. Journal of Cryptologic Research, 2019, 6(6): 704–712

    Google Scholar 

  3. Biham E. A fast new DES implementation in software. In: Proceedings of the 4th International Conference on Fast Software Encryption. 1997, 260–272

  4. Ganesh V, Dill D L. A decision procedure for bit-vectors and arrays. In: Proceedings of the 19th International Conference on Computer Aided Verification. 2007, 519–531

  5. Lipmaa H, Moriai S. Efficient algorithms for computing differential properties of addition. In: Proceedings of the 8th International Conference on Fast Software Encryption. 2001, 336–350

Download references

Acknowledgements

This work was supported by the Major Basic Research Project of Natural Science Foundation of Shandong Province, China (No. ZR202010220025), and Key Research Project of Zhejiang Province, China (No. 2023C01025). The author (Tingting Cui) is supported by the Open Project Program from Key Laboratory of Cryptologic Technology and Information Security (Ministry of Education), Shandong University.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tingting Cui.

Ethics declarations

Competing interests The authors declare that they have no competing interests or financial conflicts to disclose.

Electronic Supplementary Material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jia, C., Ling, Q., Wu, T. et al. Structure attack on full-round DBST. Front. Comput. Sci. 18, 184820 (2024). https://doi.org/10.1007/s11704-024-3438-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11704-024-3438-0