Related-Key Cryptanalysis of the Full AES-192 and AES-256, pp.11-12 ,
DOI : 10.1007/978-3-642-10366-7_1
A New Security Analysis of AES-128. CRYPTO 2009 rump session, slides only, 2009. ,
Biclique Cryptanalysis of the Full AES, Lecture Notes in Computer Science, vol.7073, pp.344-371, 2011. ,
DOI : 10.1007/978-3-642-25385-0_19
Automatic Search of Attacks on Round-Reduced AES and Applications, Lecture Notes in Computer Science, vol.6841, pp.169-187, 2011. ,
DOI : 10.1007/978-3-642-22792-9_10
URL : https://hal.archives-ouvertes.fr/hal-01110414
Understanding Two-Round Differentials in AES, Lecture Notes in Computer Science, vol.4116, pp.78-94, 2006. ,
DOI : 10.1007/11832072_6
Improved Single-Key Attacks on 8-Round AES-192 and AES-256, Lecture Notes in Computer Science, vol.6477, pp.158-176, 2010. ,
DOI : 10.1007/978-3-642-17373-8_10
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.295.9494
Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations, Lecture Notes in Computer Science, vol.6147, pp.365-383, 2010. ,
DOI : 10.1007/978-3-642-13858-4_21
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.1874
Known-Key Distinguishers for Some Block Ciphers, Lecture Notes in Computer Science, vol.4833, pp.315-324, 2007. ,
DOI : 10.1007/978-3-540-76900-2_19
Rebound Distinguishers: Results on the Full Whirlpool Compression Function, pp.126-143 ,
DOI : 10.1007/978-3-642-10366-7_8
Advances in Cryptology -ASIACRYPT, 15th International Conference on the Theory and Application of Cryptology and Information Security Proceedings, 2009. ,
Improved Cryptanalysis of the Reduced Gr??stl Compression Function, ECHO Permutation and AES Block Cipher, Lecture Notes in Computer Science, vol.5867, pp.16-35, 2009. ,
DOI : 10.1007/978-3-642-05445-7_2
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Gr??stl, Lecture Notes in Computer Science, vol.5665, pp.260-276, 2009. ,
DOI : 10.1007/978-3-642-03317-9_16
Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks, Lecture Notes in Computer Science, vol.16, issue.4, pp.60-76, 2009. ,
DOI : 10.1007/s00145-003-0220-6
URL : https://hal.archives-ouvertes.fr/inria-00524350
Known and Chosen Key Differential Distinguishers for Block Ciphers, Lecture Notes in Computer Science, vol.6829, pp.29-48, 2010. ,
DOI : 10.1007/978-3-642-24209-0_3
Improved Known-Key Distinguishers on Feistel-SP Ciphers and Application to Camellia, ACISP. Lecture Notes in Computer Science, vol.7372, pp.87-100, 2012. ,
DOI : 10.1007/978-3-642-31448-3_7
URL : http://www.researchonline.mq.edu.au/vital/access/services/Download/mq:21069/DS01
Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes, Lecture Notes in Computer Science, vol.10, pp.397-415, 2011. ,
DOI : 10.1109/TIT.1964.1053661