1 |
ANSI X3.92, 'American National Standard for Data Encryption Algorithm(DEA),' NIST, 1983
|
2 |
E. Biham and A. Shamir, 'Differential cryptoanalysis of DES-like cryptosystems,' Journal of Cryptology, Vol. 4, No. 1, pp. 3-72, 1991
DOI
|
3 |
L. Keliher, H. Meijer, and S. Tavares, 'New Method for Upper Bounding the Maximum Average Linear Hull Probability for SPNs,' Advances in Cryptology -EIROCRYPT 2001, LNCS 2045, Springer -Verlag, pp. 420-436, 2001
|
4 |
T. Jakobsen and L.R. Knudsen, 'The interpolation attack on block cipher,' Fast Software Encryption, LNCS 1267, E. Biham, Ed., Springer-Verlag, pp. 28-40, 1997
|
5 |
Webster, A. and S. Tavares, 'On the Design of S-Boxes,' Advances on Cryptology, CRYPTO'85, pp. 523-534, 1985
|
6 |
Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, ' Systematic Generation of Cryptographically Robust 5-boxes,' The preceedings of the First ACM Conference on Computer and Communications Security, pp. 172-182, Nov. 1993
|
7 |
J. Daemen, R. Govaerts and J. Vandewalle, 'Correlation Matrixes,' Fast Software Encryption, LNCS 1008, Spring-Verlag, pp. 275-285, 1994
|
8 |
H.M. Heys and S.E. Tavares, 'The Design of Substitution Permutation Networks Resistant to Differential and Linear Cryptanalysis, Proceedings of 2nd ACM Conference on Computer and Communications Security, Fairfax, Virginia, pp. 148-155, 1994
|
9 |
NIST, 'Advanced Encryption Standard Development Effort.' http:// csrc.nist.gov / encryption/aes
|
10 |
A.M. Youssef, Z.G. Chen and S.E. Tavares, 'Construction of Highly Nonlinear Injective S-boxes With Application to CAST-like Encryption Algorithms,' Proceedings of the Canadian Conference on Electrical and Computer Engineering(CCECE'97), 1997
|
11 |
V. Rijmen, J. Daemen, B. Preneel, A. Bosselaers and E. De Win, 'The cipher SHARK,' Fast Software Encryption, LNCS 1039, D. Gollmann, Ed., Springer-Verlag, pp. 99-112, 1996
|
12 |
정 찬호, 'SEED에 대한 효과적인 Brute-Force 공격 알고리즘,' 한국항공대학교 컴퓨터공학과 석사학위논문, 2001
|
13 |
H.M. Heys and S.E. Tavares, 'Avalanche Characteristics of Substitution Permutation Encryption Networks,' IEEE Transaction on Computer, Vol. 44, pp. 1131-1139, Sep. 1995
DOI
ScienceOn
|
14 |
J. S. Kang, C. S. Park, S. J. Lee and J. L. Lim, 'On the optimal diffusion layer with practical security against Differential and Linear Cryptanalysis,' Proceedings of ICISC'99, LNCS 1787, Spring-Verlag, pp. 33-52, 1999
|
15 |
Young-Ho Seo, Jong-Hyeon Kim and Dong-Wook Kim, 'Hardware Implementation of 128-bit Symmetric Cipher SEED,' The Second IEEE Asia Pacific Conference on ASICs, pp. 183-186, Aug. 2000
|
16 |
이 명동, 'SEED 암호 알고리즘의 FPGA 구현을 위한 RTL 수준 VHDL 설계,' 한남대학교 대학원 컴퓨터공학과 석사학위논문, 2001
|
17 |
전 신우, 정 용진, '128 비트 SEED 암호 알고리즘의 고속처리를 위한 하드웨어 구현,' 통신정보보호학회지, Vol. 11, No. 1, pp. 13-23, Feb. 2001
|
18 |
Joan Daemen, Vincent Rijmen, 'AES Proposal: Rijndael', 1999
|
19 |
H.M. Heys and S.E. Tavares, 'The Design of Product Ciphers Resistant to Differential and Linear Cryptanalysis,' Journal of Cryptology, Vol. 9, no. 1, pp. 1-19, 1996
DOI
|
20 |
M. Matsui, 'The first experimental cryptanalysis of the Data Encryption Standard,' Advances in Cryptology, Proceedings of CRYPTO '94, Springer-Verlag, Berlin, pp. 1-11, 1994
|
21 |
Serge Mister and Carlisle Adams, 'Practical S-box Design,' Workshop record of the workshop on selected area in Cryptography(SAC'96), Queen's University, pp. 61-76, Aug. 1996
|
22 |
K. Nyberg, 'Differentially uniform mappings for cryptography,' Advances in Cryptology, Proceedings of Eurocrypt '93, LNCS 765, T. Helleseth, ED., Springer-Verlag, pp. 55-64, 1994
|
23 |
한국정보보호센터, 128 비트 블록 암호알고 리즘(SEED) 개발 및 분석 보고서, Dec. 1998
|
24 |
A.M. Youssef, S. Mister and S.E. Tavares, 'On the Design of Linear Transformations for Substitution Permutation Encryption Networks,' ACM Symposium on Applied Computing (SAC'97), Feb. 1997
|
25 |
Nyberg, K., 'Perfect nonlinear S-boxes,' In Advances in Cryptology, EUROCRYPT'91, Vol. 547, Lecture Notes in Computer Science, Springer-Verlag, pp. 378-386, 1991
|
26 |
S. Vaudenay, 'On the need for multipermutations: Cryptanalysis of MD4 and SAFER,' Proceedings of Fast Software Encryption (2), LNCS 1008, Springer-Verlag, pp. 286-297, 1995
|
27 |
J. Daemen, L. Knudsen and V. Rijmen, 'The block cipher SQUARE,' Proceedings of Fast Software Encryption (4), LNCS, Springer-Verlag, 1997
|