1 |
R.P. Weinmann and K. Wirt, "Analysis of the DVB Common Scrambling Algorithm," in Proc. of IFIP International Federation for Information Processing 2005, Volume 175/2005, pp.195-207, 2005. Article (CrossRef Link).
|
2 |
K. Wirt, "Fault attack on the DVB Common Scrambling Algorithm," in Proc. of Computational science and its applications-ICCSA 2005, Volume 3481, pp.511-517, 2005. Article (CrossRef Link).
|
3 |
L. Simpson, M. Henricksen and W.S. Yap, "Improved Cryptanalysis of the Common Scambling Algorithm Stream Cipher," in Proc. of the 14th Australasian Conference on Information Security and Privacy 2009, pp.108-121, 2009. Article (CrossRef Link).
|
4 |
E. Tews, J. Walde and M. Weiner, "Breaking DVB-CSA," in Proc. of West European Workshop on Research in Cryptography 2011, pp.41-45, 2011. Article (CrossRef Link).
|
5 |
L.R. Knudsen, "DEAL-A 128-bit Block Cipher," Technical Report 151, Department of Informatics, University of Bergen, Bergen, Norway, Feb. 1998. Article (CrossRef Link).
|
6 |
E. Biham, A. Biryukov, "A. Shamir. Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials," in Proc. of Eurocrypt'99. Berlin: Springer-Verlag, LNCS, 1999. 1592: pp. 12-23, 1999. Article (CrossRef Link).
|
7 |
E. Biham and A. Shamir, “Differential Cryptanalysis of DES-like Cryptosystems,” Journal of Cryptology, Vol 3, pp. 3-72, 1991. Article (CrossRef Link)
DOI
|
8 |
E. Biham and N. Keller, "Cryptanalysis of Reduced Variants of Rijndael," 3rd AES Conference, 2000. Article (CrossRef Link)
|
9 |
W. Zhang, W. Wu, L. Zhang, D. Feng, "Improved related-key impossible differential attacks on reduced-round AES-192," in Proc. of Selected Areas in Cryptography (SAC 2006), Montreal, Canada, Springer-Verlag, August 17-18, pp. 168-181, 2006. Article (CrossRef Link)
|
10 |
W. Wu, W. Zhang, D. Feng, “Impossible differential cryptanalysis of reduced-round ARIA and Camellia,” Journal of computer science and technology, 22(3): 449-456, 2007. Article (CrossRef Link)
DOI
|
11 |
W. Wu, L. Zhang, W. Zhang, "Improved Impossible Differential Cryptanalysis of Reduced- Round Camellia," in Proc. of Selected Areas in Cryptography (SAC 2008), Springer-Verlag, LNCS vol. 5381, pp. 442-456, 2009. Article (CrossRef Link)
|
12 |
J. Chen, K. Jia, H. Yu, X. Wang, "New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256," in Proc. of Information Security and Privacy, Springer-Verlag, LNCS vol. 6812, pp. 16-33, 2011. Article (CrossRef Link)
|
13 |
C. Du, J. Chen, "Impossible Differential Cryptanalysis of ARIA Reduced to 7 Rounds," in Proc. of Cryptology and Network Security, LNCS vol. 6467, pp. 20-30, 2010. Article (CrossRef Link)
|
14 |
S. Li, C. Song, "Improved Impossible Differential Cryptanalysis of ARIA," in Proc. of Information Security and Assurance, ISA 2008, pp. 129-132, 2008. Article (CrossRef Link)
|
15 |
K. Zhang, J. Guan “Distinguishing Attack on Common Scrambling Algorithm,” The International Arab Journal of Information Technology, 12(4), 410-414, 2015.
|