References
- H. Feistel, "Cryptography and Computer Privacy." Scientific American, Vol.228, No.5, pp. 15-23, 1973. https://doi.org/10.1038/scientificamerican0573-15
- C.E. Shannon, "Communication Theory of Secrecy System" Bell System Technical Journal, Vol. 28, No. 4, page 656-715, 1949. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
- "Report on the Development of the Advanced Encryption Standard(AES)", http://www.csrc.nist.gov/encryption/aes/.
- J. Daemen, and V. Rijmen, "AES Proposal: Rijndael," http://www.csrc.nist.gov/ encryption/ aes/rijndael/Rijndael.pdf, 1999.
- Daesung Kwon, et. al., "New block cipher : ARIA," Information security and cryptology - ICISC 2003, 6th international, pp. 432-445, 2003
- H. Handschuh and D. Naccache, "SHACAL, " Primitive submitted to NESSIE by Gemplus, Sep. 2000.
- "New European Schemes for Signatures. Integrity. and Encryption(NESSIE)." http://cryptonessie.org/.
- 조경연, 송홍복, "암호와 복호가 동일한 변형 AES," 한국산업정보학회논문지, 제15권, 2호, pp. 1-9, 6월 2010.
- 조경연, "암호와 복호가 동일한 SPN 블록 암호 SSB," 한국해양정보통신학회논문지, 제15권, 4호, pp. 860-868, 2011. https://doi.org/10.6109/jkiice.2011.15.4.860
- 조경연, 송홍복, "비트 슬라이스 대합 S-박스에 의한 대칭 SPN 블록암호," 한국전자통신학회논문지, 제6권, 2호, pp. 171-179, 2011.
- A. M. Youssef, S. Mister, and S. E. Tavares, "On the Design of linear Transformation for Substitution and Permutation Encryption Networks," in the Workshop Record of the Workshop on Selected Areas in Cryptography (SAC `97), pp. 40-48, Aug. 1997.
- S. Vaudenay, "On the need for multipermutations: Cryptanalysis of MD4 and SAFER," Proc. of Fast Software Encryption(2), LNCS 1008, Springer-Verlag, pp. 286-297, 1995
- V. Rijmen, J. Daemen, B. Preneel, A. Bosselares, and E. De Win, "The cipher SHARK," Fast Software Encryption, LNCS 1-39, D. Gollmann Ed., Springer-Verlag, pp. 99-112, 1996
- J. Daemen, L. Knudsan, and V. Rijmen, "The Block Cipher Square," Proceeding of FSE'97, LNCS Vol.1267, pp. 149-165, 1997.
- E. Biham and A. Shamir, "Differential Cryptanalysis of the Full 16-Round DES", LNCS 537, page 2-21, 1990.
- M. Matsui, "Linear Cryptanalysis Method for DES", LNCS 765, page 386-397, 1994.
- A. Birynkov, "The Boomerang attack on 5 and 6-round reduced AES", LNCS 3373, page 42-57, 2005.
- J. Cheon, M. Kim, K. Kim, J. Lee and S. Kang, "Improved impossible differential cryptanalysis of Rijndael and Crypton", LNCS 2288, page 39-49, 2001.
- L. R. Knudsen, "Truncated and higher order differential," Fast Software Encryption-Second International Workshop, LNCS Vol.1008, pp. 196-211, 1995.
- S. Hong, S. Lee, J. Lim, J. Sung, and D. Cheon, "Provable security against differential and linear cryptanalysis for the SPN structure," In Fast Software Encryption 2000, LNCS Vol.1978, pp. 273-283, 2001.
Cited by
- Security Analysis on Block Cipher XSB vol.2, pp.7, 2013, https://doi.org/10.3745/KTCCS.2013.2.7.311