1 |
안태남 외 2 역, "정보보안 이론과 실제", 한빛 미디어, 2006.
|
2 |
김광조, "DES 선형 해독법에 관한 해설(1)", 통신정보보호학회지 제3권 제3호, 1993.
|
3 |
E. Biham and A. Shamir, "Differential Cryptanalysis of DES-like Crypto Systems", Jour. of CRYPTOLOGY, Vol. 4, No. 1, 1991.
|
4 |
E. Biham and A. Shamir, "Differential Cryptanalysis of FEAL and N-hash", Technical Report, Weizmann Institude of Science, Israel, 1991.
|
5 |
M. H. Dawson and S. E. Tavares, "An Expanded Set of S Box Design Criteria based on Information Theory and it Relation to Differential-like Attacks", Proc. of EUROCRYPT91, Springer-Verlag, 1991.
|
6 |
L. Brown, M. Kwan, J. Pieprzyk and J. Seberry, "Improving Registance to Differential Cryptoanalysis and the Redesigh of LOKI", Abstract of ASIACRYPT'91, 1991
|
7 |
M. Matsui, "Linear Cryptanalysis Method for DES Cipher", Abstracts of EUROCRYPT'93, pp. W112-W123, May 1993.
|