References
- E. Andreeva, A. Bogdanov, Y. Dodis, B. Mennink and J. P. Steinberger, "On the Indifferentiability of Key-Alternating Ciphers", Advances in Cryptology - CRYPTO 2013, LNCS Vol. 8042, pp. 531-550, 2013.
- K. Aoki, T. Ichikawa, M. Kanda, M. Matsui, S. Moriai, J. Nakajima and T. Tokita, "Specification of Camellia - a 128-bit Block Cipher", http://info.isl.ntt.co.jp/camellia/, 2000.
- E. Biham and A. Biryukov, "An Improvement of Davies' Attack on DES", Journal of Cryptology, Vol. 10, No. 3, pp. 195-206, 1997. https://doi.org/10.1007/s001459900027
- E. Biham, O. Dunkelman and N. Keller, "Enhancing Differential-Linear Cryptanalysis", Advances in Cryptology-ASIACRYPT 2002, LNCS Vol. 2501, pp. 254-266, 2002.
- E. Biham and A. Shamir, "Differential Cryptanalysis of DES-like Cryptosystems", Advances in Cryptology - CRYPTO 1990, LNCS Vol. 537, pp. 2-21, 1990.
- A. Biryukov and D. Wagner, "Advanced Slide Attacks", Advances in Cryptology - EUROCRYPT 2000, LNCS Vol. 1807, pp. 589-606, 2000.
- A. Bogdanov, L. R. Knudsen, G. Leander, F. Standaert, J. Steinberger and E. Tischhauser, "Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations", Advances in Cryptology - EUROCRYPT 2012, LNCS Vol. 7237, pp. 45-62, 2012.
- S. Chen, R. Lampe, J. Lee, Y. Seurin and J. P. Steinberger, "Minimizing the two-round Even-Mansour cipher", Advances in Cryptology - CRYPTO 2014, LNCS Vol. 8616, pp. 39-56, 2014.
- S. Chen and J. P. Steinberger, "Tight Security Bounds for Key-Alternating Ciphers", Advances in Cryptology - EUROCRYPT 2014, LNCS Vol. 8441, pp. 327-350, 2014.
- J. Daemen, "Limitations of the Even-Mansour Construction", Advances in Cryptology - ASIACRYPT 1991, LNCS Vol. 739, pp. 495-498, 1993.
- Y. Dai, J. Lee, B. Mennink and J. P. Steinberger, "The Security of Multiple Encryption in the Ideal Cipher Model", Advances in Cryptology - CRYPTO 2014, LNCS Vol. 8616, pp. 20-38, 2014.
- I. Dinur, O. Dunkelman, N. Keller and A. Shamir, "Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2". Advances in Cryptology - ASIACRYPT 2013, LNCS Vol. 8269, pp. 337-356, 2013.
- I. Dinur, O. Dunkelman, N. Keller and A. Shamir, "Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys", Advances in Cryptology - ASIACRYPT 2014, LNCS Vol. 8873, pp. 439-457, 2014.
- O. Dunkelman, N. Keller and A. Shamir, "Minimalism in Cryptography: The Even-Mansour Scheme Revisited", Advances in Cryptology - EUROCRYPT 2012, LNCS Vol. 7237, pp. 336-354, 2012.
- S. Even and Y. Mansour, "A Construction of a Cipher from a Single Pseudorandom Permutation", Advances in Cryptology - ASIACRYPT 1991, LNCS Vol. 739, pp. 210-224, 1993.
- S. Even and Y. Mansour, "A Construction of a Cipher from a Single Pseudorandom Permutation", Journal of Cryptology, Vol. 10, No. 3, pp. 151-162, 1997. https://doi.org/10.1007/s001459900025
- FIPS PUB 46: Data Encryption Standard (DES). National Institute of Standards and Technology, 1977.
- FIPS PUB 197: Advanced Encryption Standard (AES). National Institute of Standards and Technology, 2001.
- P. Gazi and S. Tessaro, "Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading", Advances in Cryptology - EUROCRYPT 2012, LNCS Vol. 7237, pp. 63-80, 2012.
- D. Kwon, J. Kim, S. Park, S. H. Sung, Y. Sohn, J. H. Song, Y. Yeom, E. J. Yoon, S. Lee, J. Lee, S. Chee, D. Han and J. Hong, "New Block Cipher: ARIA", ICISC 2003, LNCS Vol. 2971, pp. 432-445, 2003.
- X. Lai and J. L. Massey, "A Proposal for a New Block Encryption Standard", Advances in Cryptology - EUROCRYPT 1990, LNCS Vol. 473, pp. 389-404, 1991.
- M. Matsui, "Linear Cryptanalysis Method for DES Cipher", Advances in Cryptology - EUROCRYPT 1993, LNCS Vol. 765, pp. 386-397, 1993.
- M. Matsui, "The First Experimental Cryptanalysis of the Data Encryption Standard", Advances in Cryptology - CRYPTO 1994, LNCS Vol. 839, pp. 1-11, 1994.
- M. Matsui, "Block encryption algorithm MISTY", proceedings of Fast Software Encryption 1997, LNCS Vol. 1267, pp. 64-74, 1997.
- C. E. Shannon, "Communication theory of secrecy systems", Bell System Technical Journal, Vol. 28, pp. 656-715, 1949. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
- 3rd Generation Partnership Project, Technical Specification Group Services and System Aspects, 3G Security, Specification of the 3GPP Confidentiality and Integrity Algorithms; Document 2: KASUMI Specification, V3.1.1, 2001.