References
- E. Biham and A. Shamir, 'Differential cryptanalysis of DES-like Cryptosysterns,' Advances in Cryptology-CRYPTO' 90. LNCS 537. pp. 2-21. Springer-Verlag. 1990
- E. Biham. 'New Types of Cryptanalytic Attacks Using Related Keys,' Journal of Cryptology, v, 7, n. 4, pp. 229-246. 1994
- E. Biham, A. Biryukov and A. Shamir, 'Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials.' Advances in Cryptology-EUROCRYPT' 99. LNCS 1592. pp. 12-23. Springer-Verlag. 1999
- E. Biham. O. Dunkelman and N. Keller. 'The Rectangle Attack-Rectangling the Serpent.' Advances in Cryptology-EUROCRYPT' 01. LNCS 2045. pp. 340-357. Springer-Verlag. 2001
- E. Biham. O. Dunkelman and N. Keller. 'Rectangle Attacks on 49-Round SHACAL-1.' Advances in Cryptology-FSE '03. LNCS 2887. pp. 22-35. Springer- Verlag. 2003.
- M. Blunden and A. Escott. 'Related Key Attacks on Reduced Round KASUMI,' Advances in Cryptology-FSE '01. LNCS 2355. pp. 277-285. Springer- Verlag. 2001.
- H. Handschuh and D. Naccache. 'SHACAL: A Family of Block Ciphers.' Submission to the NESSIE project. 2000
- S. Hong. J. Kim. G. Kim, J. Sung. C. Lee and S. Lee. 'Impossible Differential Attack on 30-round SHACAL-2.' Advances in Cryptology-INDOCRYPT '03, LNCS 2904. pp. 97-106. Springer-Verlag. 2003
- G. Jakimoski and Y. Desmedt. 'Related Key Differential Cryptanalysis of 192-bit Key AES Variants.' SAC'03. To appear.
- J. Kelsey. B. Schneier and D. Wagner. 'Key Schedule Cryptanalysis of IDEA. G-DES. GOST. SAFER. and Triple-DES.'Advances in Cryptology-CRYPTO' 96. LNCS 1109. pp. 237-251. Springer-Verlag. 1996
- J. Kelsey. B. Schneier and D. Wagner.' Related Key Cryptanalysis of 3-WAY. Biham-DES. CAST. DES-X. NewDES. RC2. and TEA,' Advances in Cryptology - ICICS'97, LNCS 1334, pp. 223-246, Springer-Verlag. 1997
- J. Kelsey. T. Kohno, and B. Schneier. 'Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent,' Advances in Cryptology-FSE'01. LNCS 1978. pp. 75-93, Springer-Verlag. 2001
- 김종성, 문덕재, 이원일, 홍석희, 이상진, 'SHACAL의 축소 라운드에 대한 확장된 부메랑 공격.' 정보보호학회논문지, 12(5), pp. 97-93, October. 2002.
- L.R. Knudsen. 'Truncated and Higher Order Differenatials.' Advances in Cryptology - FSE'96, LNCS 1039. pp. 196-211. Springer-Verlag, 1996
- Y. Ko. S. Hong. W. Lee, S. Lee and J. Kang. 'Related Key Differential Attacks on 26 rounds of XTEA and Full Rounds of GOST.' FSE'04, To appear.
- D. Wagner. 'The Boomerang Attack.' Advances in Cryptology-FSE'99. LNCS 1636. pp. 156-170. Springer-Verlag. 1999
- U.S. Department of Commerce.FIPS 180-1: Secure Hash Standard .Federal Information Processing Standards Publication. N.I.S.T .. April 1995