References
- E. Biham and A. Shamir, 'Differential Cryptanalysis of DES-like cryptosystems', Advances in Cryptology CRYPTO '90, LNCS 537, pp. 2-21,1990
- E. Biham and A. Shamir, 'Differential Cryptanalysis of Feal and Hash', Advances in Cryptology EUROCRYPT '91, LNCS 547, pp. 1-16, 1991
- E. Biham and A. Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, New York, 1993
- B. S. Kaliski and Y. L. Yin, 'On differential and linear cryptanalysis of the RC5 encryption', Advances in Cryptology - CRYPTO '95, LNCS 963, pp. 171-184,1995
- L. R. Knudsen, 'Practically Secure Feistel Ciphers, Fast Software Encryption', Cambridge Security Workshop Proceedings, pp. 211-221, 1994
- M. Matsui, 'Linear Cryptanalysis Method for DES Cipher', Advances in Cryptology - EUROCRYPT '93, LNCS 765, pp. 386-397,1993
- M. Matsui, 'The first experimental cryptanalysis of the Data Encryption Standard', Advances in Cryptology - CRYPTO '94, LNCS 839, pp. 1-11, 1994
- A J. Menezes, P. C. Oorschot, and S. A Vanstone, Applied Cryptography, CRC Press, 1997
- K. Ohta, S. Moriai, and K. Aoki, 'Improving the Search Algorithm for the Best Linear Expression', Advances in Cryptology - EUROCRYPT '95, LNCS 963,pp. 157-170, 1995
- R. L. Rivest, 'The RC5 encryption algorithm', Fast Software Encryption, Second International Workshop, LNCS1008, pp. 86-96, Springer-Verlag, 1995
- B. Schneier, Applied cryptography, John Wiley Sons, 1996
- B. Schneier and J. Kelsey, 'Unbalanced Feistel Networks and Block-Cipher Design', Fast Software Encryption, Cambridge Security Workshop Proceedings, pp. 121-144, 1996
- C.E. Shannon, 'Communication theory of secrecy systems', Bell System Technical Journal, v. 27, n. 4, pp. 379-423, 1948 https://doi.org/10.1002/j.1538-7305.1948.tb01338.x