1 |
E. Biham and A. Shamir, 'Differential cryptanalysis of DES-like crytosystems, Journal of Cryptology', vol. 4, no. 1, pp. 3-72, 1991
DOI
|
2 |
H.M. Heys and S.E. Tavares, 'The design of product ciphers resistant to differential and linear cryptanalysis', Journal of Cryptology, Vol. 9, no. 1, pp. 1-19, 1996
DOI
|
3 |
A.M. Youssef, S. Mister, S.E. Tavares, 'On the Design of Linear Transformation for Substitution Permutation Encryption Netw-orks', in the Workshop Record of the Workshop on Selected Areas in Cryptography(SAC '97), pp. 40-48, Aug. 11-12, 1997
|
4 |
박창수, 조경연, 송홍복, 'SEED 형식 암호에서 공격에 강한 S 박스와 G 함수의 실험적설계', 한국해양정보통신학회, TBD
|
5 |
한국정보보호센터, '128 비트 블록 암호 알고리즘(SEED) 개발 및 분석보고서', Dec. 1998
|
6 |
Ju-Sung Kang, Choonsik Park, Sangjin Lee, and Jong-In Lim, 'On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis', Proceedings of ICISC'99, LNCS 1787, Spring-Verlag pp. 33-52, 1999
|
7 |
H.M. Heys and S.E. Tavares, 'The design of substitution-permutation networks resistant to differential and linear cryptanalysis', Proceedings of 2nd ACM Conference on Computer and Communications Security, Fairfax, Virginia, pp. 148-155, 1994
|
8 |
S. Vaudenay, 'On the need for multipermutations: Crytanalysis of MD4 and SAFER', Proc. of Fast Software Encryption (2), LNCS 1008, Springer-Verlag, pp. 286-297, 1995
|
9 |
A.M. Youssef and S.E. Tavares, 'Resistance of Balanced S-boxes to Linear and Differential Crypanalysis,' Information Processing Letters, Vol. 56, pp. 249-252, 1995
DOI
ScienceOn
|
10 |
F.J. MacWilliams and N.J.A. Sloane, 'The theory of error correcting codes', North-Holland Publishing Company, 1977
|
11 |
V. Rijmen, J. Daemen, B. Preneel, A. Bosselaers, and E. De Win, 'The cipher SHARK', Fast Software Encryption, LNCS 1039, D. Gollmann, Ed., Springer-Verlag, pp. 99-112, 1996
|
12 |
M. Matsui, 'The first experimental cryptanalysis of the Data Encryption Standard, Advances in Cryptology', Proc. Of EUROCRYPT '91, Springer-Verlag, Berlin, pp. 1-11, 1994
|
13 |
J. Daemen, L. Knudsen, and V. Rijmen, 'The block cipher SQUARE', Proc. of Fast Software Encryption (4), LNCS, Springer-Verlag, 1997
|
14 |
Luke O'Connor, 'On the Distribution of Characteristics in Bijective Mapping,' Advances in Cryptology, Proc. of EuroCrypt' 93, Springer-Verlag, pp. 99-112, 1996
|