On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model, Fast Software Encryption -FSE 2011, pp.128-145, 2011. ,
DOI : 10.1007/978-3-540-75670-5_13
URL : https://hal.archives-ouvertes.fr/hal-01287992
A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications, Advances in Cryptology -EUROCRYPT 2003, pp.491-506, 2003. ,
DOI : 10.1007/3-540-39200-9_31
DES-X (or DESX), Encyclopedia of Cryptography and Security, p.331, 2011. ,
PRINCE ??? A Low-Latency Block Cipher for Pervasive Computing Applications, Advances in Cryptology -ASIACRYPT 2012, pp.208-225, 2012. ,
DOI : 10.1007/978-3-642-34961-4_14
Covering radius---Survey and recent results, IEEE Transactions on Information Theory, vol.31, issue.3, pp.31328-343, 1985. ,
DOI : 10.1109/TIT.1985.1057043
The Real Reason for Rivest's Phenomenon. In Advances in Cryptology -CRYPTO'85, LNCS, vol.218, pp.535-536, 1985. ,
Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE, Advances in Cryptology -EUROCRYPT 2015, 2015. ,
DOI : 10.1007/978-3-662-46800-5_10
URL : https://hal.archives-ouvertes.fr/hal-01235168
A construction of a cipher from a single pseudorandom permutation, Advances in Cryptology -ASIACRYPT '91, pp.210-224, 1993. ,
DOI : 10.1007/3-540-57332-1_17
Primitive normal polynomials with the specified last two coefficients, Discrete Mathematics, vol.309, issue.13, pp.4502-4513, 2009. ,
DOI : 10.1016/j.disc.2009.02.012
Some cryptographic techniques for machine-to-machine data communications, Proceedings of the IEEE, pp.1545-1554, 1975. ,
DOI : 10.1109/PROC.1975.10005
Analytic Combinatorics, 2009. ,
DOI : 10.1017/CBO9780511801655
URL : https://hal.archives-ouvertes.fr/inria-00072739
The LED Block Cipher, CHES, pp.326-341, 2011. ,
DOI : 10.1007/978-3-642-23951-9_22
Critique of the related-key attack concept, Designs, Codes and Cryptography, vol.7, issue.4, pp.159-168, 2011. ,
DOI : 10.1007/s10623-010-9451-3
Existence Results for Finite Field Polynomials with Specified Properties In Finite Fields and Their Applications -Character sums and polynomials, RSCAM, vol.11, pp.65-87, 2013. ,
How to Protect DES Against Exhaustive Key Search (an Analysis of DESX), Journal of Cryptology, vol.14, issue.1, pp.17-35, 2001. ,
DOI : 10.1007/s001450010015
Differentially uniform mappings for cryptography, Advances in Cryptology -EUROCRYPT'93, pp.55-64, 1993. ,
DOI : 10.1007/3-540-48285-7_6
Reflection Cryptanalysis of PRINCE-like Ciphers, Fast Software Encryption -FSE 2013, pp.71-91, 2014. ,
A New Class of Substitution- Permutation Networks, Selected Areas in Cryptography -SAC'96, pp.132-147, 1996. ,