1 |
Kwon D, Kim J, Park S, et al., "New block cipher: ARIA," in Proc. of 6-th International Conference on Information Security and Cryptology-ICISC 2003, 2971, 432-445, 2003.
|
2 |
Biham E, Shamir A, "Differential cryptanalysis of DES-like cryptosystems," Journal of Cryptology, 4(1), 3-72, 1991.
DOI
|
3 |
Matsui M, "Linear cryptanalysis method for DES cipher," in Proc. of Advances in Cryptology -EUROCRYPT 1993, 386-397,1994.
|
4 |
Knudsen L R, Wagner D, "Integral cryptanalysis," Fast Software Encryption-FSE 2002, pp. 112-127, 2002.
|
5 |
Knudsen L R, "Truncated and higher order differentials," Fast Software Encryption-FSE 1994, 196-211,1995.
|
6 |
Biham E, Biryukov A, Shamir A, "Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials," in Proc. of Advances in Cryptology-EUROCRYPT 1999, 12-23, 1999.
|
7 |
Zhang K, Guan J, Hu B, "Impossible differential cryptanalysis on DVB-CSA," KSII Transactions on Internet and Information Systems, 10(4), 1944-1956, 2016.
DOI
|
8 |
Shen X, Liu G Q, Li C, et al., "Impossible differential cryptanalysis of Fantomas and Robin" IEICE Trans. Fundamentals, E101-A(5), 863-866, 2018.
DOI
|
9 |
Han G Y, Zhang W Y, Zhao, H L, "An upper bound of the longest impossible differentials of several block ciphers," KSII Transactions on Internet and Information Systems, 13(1), 435-451, 2019.
DOI
|
10 |
Cui T, Jin C H, "Finding impossible differentials for Rijndael-like and 3D-like structures," KSII Transactions on Internet and Information Systems, 7(3), 509-520, 2013.
DOI
|
11 |
Shen X, Liu G Q, Sun B, et al., "Impossible differentials of SPN ciphers," INSCRYPT 2016, 47-63, 2016.
|
12 |
Knudsen, L R, "DEAL-A 128-bit block cipher," Technical Report, 1998.
|
13 |
Wu W L, Zhang W T, Feng D G, "Impossible differential cryptanalysis of reduced-round ARIA and Camellia," Journal of Computer Science and Technology, 22(3), 449-456, 2007.
DOI
|
14 |
Li S H, Song C Y, "Improved impossible differential cryptanalysis of ARIA," in Proc. of 2008 International Conference on Information Security and Assurance-ISA 2008, 129-132, 2008..
|
15 |
Li R L, Sun B, Zhang P, et al., "New impossible differential cryptanalysis of ARIA," http://eprint.iacr.org/2010/307.pdf, 2010.
|
16 |
Du C H, Chen J Z, "Impossible differential cryptanalysis of ARIA reduced to 7 rounds," in Proc. of the 9th International Workshop on Cryptology and Network Security-CANS 2010, 20-30, 2010.
|
17 |
Lu J, Kim J, Keller N, et al., "Improving the efficiency of impossible differential cryptanalysis of reduced Camellia and MISTY1," CT-RSA 2008, 1592, 370-386, 2008.
|
18 |
Su C M, "New impossible differential attack on 7-round reduced ARIA," Journal of Computer Applications, 32(1), 45-48, 2012.
DOI
|
19 |
Xie G Q, Wei H R, "Impossible differential attack of block cipher ARIA," Journal of Computer Reseach and Development, 55(6), 1201-1210, 2018.
|