References
- D. Kwon et al., "New Bock Cipher: ARIA," Proc. Int. Conf. Inform. Security Cryptology, Seoul, Rep. of Korea, Nov. 27-28, 2003, pp. 432-445.
- National Security Research Institute: Specification of ARIA, version 1.0, January 2005. http://www.nsri.re.kr/ARIA/doc/ARIAspecification-e.pdf
- Korean Agency for Technology and Standards (KATS): 128 bit Block Encryption Algorithm ARIA, KS X 1213:2004, Dec. 2004.
- D. Kwon et al., A Description of the ARIA Encryption Algorithm. RFC 5794, Mar. 2010. https://tools.ietf.org/html/rfc5794
- W. Kim et al., Addition of the ARIA Cipher Suites to Transport Layer Security (TLS). RFC 6209, Apr. 2011. https://tools.ietf.org/html/rfc6209
- RSA Laboratories, Additional PKCS \#11 Mechanisms, PKCS \#11 v2.20 Amendment, Revision 1, 2007.
- P. Li, B. Sun, and C. Li, "Integral Cryptanalysis of ARIA," Int. Conf. Inscrypt, Beijing, China, Dec. 12-15, 2009, pp. 1-14.
- Y. Li, W. Wu, and L. Zhang, "Integral Attacks on Reduced-round ARIA Block Cipher," Proc. ISPEC, Seoul, Rep. of Korea, May 12-13, 2010, pp. 19-29.
- E. Fleischmann et al., "New Boomerang Attacks on ARIA," Int. Conf. Cryptology India, Hyderabad, India, Dec.12-15, 2010, pp. 163-175.
- X. Tang et al., "A Meet-in-the-Middle Attack on Reduced Round ARIA," J. Syst. Softw., vol. 84, no. 10, Oct. 2011, pp. 1685-1692. https://doi.org/10.1016/j.jss.2011.04.053
- T. Akshima et al., "Improved Meet-in-the-Middle Attacks on 7 and 8-Round ARIA-192 and ARIA-256," Int. Conf. Cryptology India, Bangalore, India, Dec. 6-9, 2015, pp. 198-217.
- X. Bai et al., "Improved Meet-in-the-Middle Attacks on Round-reduced ARIA," Int. Conf. ISC, Dallas, TX, USA, Nov. 13-15, 2013, pp. 155-168.
- W. Wu, W. Zhang, D. Feng, "Impossible Differential Cryptanalysis of Reduced Round ARIA and Camellia," J. Comput. Sci. Technol., vol. 22, no. 3, May 2007, pp. 449-456. https://doi.org/10.1007/s11390-007-9056-0
- R. Li et al., New Impossible Differential Cryptanalysis of ARIA. http://eprint.iacr.org/2008/227
- C. Du and J. Chen, "Impossible Differential Cryptanalysis of ARIA Reduced to 7 Rounds," Int. Conf. CANS, Kuala Lumpur, Malaysia, Dec. 12-14, 2010, pp. 20-30.
- W. Yi, S. Chen, and K. Wei, "Zero-Correlation Linear Cryptanalysis of Reduced Round ARIA with Partial-sum and FFT," Trans. Internet Inform. Syst., vol. 9, no. 1, 2015, pp. 280-295.
- S. Chen and T. Xu, "Biclique Attack of the Full ARIA-256," IET Inform. Security, vol. 8, no. 5, 2014, pp. 259-264. https://doi.org/10.1049/iet-ifs.2012.0353
- S. Langford and M.E. Hellman, "Differential-Linear Cryptanalysis," Advances in Cryptology - CRYPTO '94, vol. 839, Heidelberg, Berlin; Springer, pp. 17-25.
- E. Biham, O. Dunkelman, and N. Keller, "Enhancing Differential-linear Cryptanalysis," Advances in Cryptology - ASIACRYPT 2002, vol. 2501, Heidelberg, Berlin; Springer, pp. 254-266.
- S. Langford, "Differential-Linear Cryptanalysis and Threshold Signatures," Ph.D. Thesis, 1995.
- Z. Liu et al., "Differential-Multiple Linear Cryptanalysis," Int. Conf. Inscrypt, Beijing, China, Dec.12-15, 2009, pp. 35-49.
- J. Lu, "A Methodology for Differential-Linear Cryptanalysis and its Applications," Proc. Fast Software Encryption, vol. 7549, Heidelberg, Berlin; Springer, pp. 69-89.
- D. Wagner, "Towards a Unifying View of Block Cipher Cryptanalysis," Proc. FSE 2004, vol. 3017, Heidelberg, Berlin; Springer, pp.16-33.
- C. Blondeau, G. Leander, and K. Nyberg, "Differential-Linear Cryptanalysis Revisited," Int. Workshop FSE, London, UK, Mar. 3-5, 2014, pp. 411-430.
- B. Sun et al., "Provable Security Evaluation of Structures Against Impossible Differential and Zero Correlation Linear Cryptanalysis," Proc. EUROCRYPT 2016, vol. 9665, pp. 196-213.
- B. Sun et al., "New Insights on the AES-like SPN Ciphers," Proc. CRYPTO 2016, vol. 9814, pp. 605-624.
- C. Blondeau et al., "Accurate Estimates of the Data Complexity and Success Probability for Various Cryptanalysis," Annu. Int. Conf. Theory Applicat. Cryptographic Techn., Vienna, Austria, May 8-12, 2016, pp. 31-34.
- A. Bogdanov et al., "On the Wrong Key Randomization and Key Equivalence Hypothesis in Matsui's Algorithm 2," Int. Workshop FSE, Singapore, Mar. 11-13, 2013, pp. 19-38.
- A. Selcuk, "On Probability of Success in Linear and Differential Cryptanalysis," J. Cryptoloy, vol. 21, no. 1, Jan. 2008, pp. 131-147. https://doi.org/10.1007/s00145-007-9013-7
- M. Hermelin, J.Y. Cho, and K. Nyberg, "Multidimensional Extension of Matsui's Algorithm 2," Proc. Fast Softw. Encyption, vol. 5665, Heidelberg, Berlin; Springer, pp. 209-227.
- K. Paterson, "On Linear Hulls, Statistical Saturation Attacks, Present and a Cryptanalysis of Puffin," Adv. Cryptology - EUROCRYPT, vol. 6632, Heidelberg, Berlin; Springer, pp. 303-322.