References
- N. Goots, A. Moldovyan and N. Moldovyan, "Fast Encryption Algorithm Spectr-H64," MMM-ACNS'01, LNCS 2052, pp.275-286, 2001.
- A. Moldovyan and N. Moldovyan, "A cipher Based on Data-Dependent Permutations," Journal of Cryptology, Vol.15, No.1, pp.61-72, 2002. https://doi.org/10.1007/s00145-001-0012-9
- N. Goots, B. Izotov, A. Moldovyan and N. Moldovyan, "Modern cryptography: Protect Your Data with Fast Block Ciphers," Wayne, A-LIST Publish., 2003.
- N. Goots, N. Moldovyan, P. Moldovyanu and D.Summerville, "Fast DDP-Based Ciphers: From Hardware to Software," 46th IEEE Midwest International Symposium on Circuits and Systems, 2003.
- N. Sklavos, N. Moldovyan and O. Koufopavlou, "High Speed Networking Security: Design and Implementation of Two New DDP-Based Ciphers," Mobile Networks and Applications-MONET, Kluwer Academic Publishers, Vol.25, Issue1-2, pp.219-231, 2005.
- N. Moldovyan, A. Moldovyan, M.Eremeev and D.Summerville, "Wireless Networks Security and Cipher Design Based on Data- Dependent Operations: Classification of the FPGA Suitable Controlled Elements," CCCT'04, Vol.VII, pp.123-128, Texas, USA, 2004.
- N.Moldovyan, A.Moldovyan, M. Eremeev and N. Sklavos, "New Class of Cryptographic Primitives and Cipher Design for Networks Security," International Journal of Network Security, Vol.2, No.2, pp.114-225, 2006.
- N. Moldovyan, "On Cipher Design Based on Switchable Controlled Operations," MMM-ACNS'03, LNCS 2776, pp.316-327, 2003.
- Y. Ko, D. Hong, S. Hong, S. Lee and J. Lim, "Linear Cryptanalysis on SPECTR-H64 with Higher Order Differential Property," MMM-ACNS'03, LNCS 2776, pp.298-307, 2003.
- Y. Ko, C. Lee, S. Hong and S.Lee, "Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1," ACISP'04, LNCS 3108, pp.137-148, 2004.
- Y. Ko, C. Lee, S. Hong, J. Sung and S. Lee, "Related-Key Attacks on DDP based Ciphers: CIKS-128 and CIKS-128H," Indocrypt'04, LNCS 3348, pp.191-205, 2004.
- C. Lee, D. Hong, S. Lee, S. Lee, H. Yang and J. Lim, "A Chosen Plaintext Linear Attack on Block Cipher CIKS-1," ICICS'02, LNCS 2513, pp.456-468, 2002.
- C. Lee, J. Kim, S. Hong, J. Sung and S. Lee, "Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b," MYCRYPT'05, LNCS 3715, pp.245-263, 2005.
- C. Lee, J. Kim, J. Sung, S. Hong and S. Lee, "Related-Key Differential Attacks on Cobra-H64 and Cobra-H128," CCC'05, LNCS 3796, pp.201-219, 2005.
- J. Lu, C. Lee and J. Kim, "Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b," SCN'06, LNCS 4116, pp.95-110, 2006.
- K. Jeong, C. Lee, J. Sung, S. Hong and J. Lim, "Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128," ACISP'07, LNCS 4586, pp.143-157, 2007.
- K. Jeong, C. Lee, J. Kim and S. Hong, "Security analysis of the SCO-family using key schedules," Information Sciences, Vol.179, pp.4232-4242, 2009. https://doi.org/10.1016/j.ins.2009.08.009
- N. Minh, N. Luan and L. Dung, "KT-64: A New Block Cipher Suitable to Efficient FPGA Implementation," IJCSNS, Vol.19, No.1, pp.10-18, 2010.