A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications, EUROCRYPT'03, pp.491-506, 2003. ,
DOI : 10.1007/3-540-39200-9_31
New Types of Cryptoanalytic Attacks Using Related Keys (Extended Abstract) In: EURO- CRYPT'93, LNCS, pp.398-409, 1993. ,
Serpent: A New Block Cipher Proposal, FSE'98, pp.222-238, 1998. ,
DOI : 10.1007/3-540-69710-1_15
A Related-Key Rectangle Attack on the Full KASUMI, ASIACRYPT'05, pp.443-461, 2005. ,
DOI : 10.1007/11593447_24
Related-Key Boomerang and Rectangle Attacks, EUROCRYPT'05, pp.507-525, 2005. ,
DOI : 10.1007/11426639_30
Differential Cryptanalysis of DES-like Cryptosystems, CRYPTO'90, pp.2-21, 1990. ,
Related-Key Cryptanalysis of the Full AES-192 and AES-256, ASIACRYPT'09, pp.1-18978, 2009. ,
DOI : 10.1007/978-3-642-10366-7_1
Distinguisher and Related-Key Attack on the Full AES-256, CRYPTO'09, pp.231-249978, 2009. ,
DOI : 10.1007/978-3-642-03356-8_14
Key Difference Invariant Bias in Block Ciphers, Advances in Cryptology -ASIACRYPT 2013 -19th International Conference on the Theory and Application of Cryptology and Information Security Proceedings, Part I. Lecture Notes in Computer Science, pp.357-376, 2013. ,
DOI : 10.1007/978-3-642-42033-7_19
PRESENT: An Ultra-Lightweight Block Cipher, CHES'07, pp.450-466, 2007. ,
DOI : 10.1007/978-3-540-74735-2_31
On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui???s Algorithm??2, Lecture Notes in Computer Science, vol.8424, pp.19-38, 2013. ,
DOI : 10.1007/978-3-662-43933-3_2
Small Scale Variants of the AES, FSE'05, pp.145-162, 2005. ,
DOI : 10.1007/11502760_10
AES and the Wide Trail Design Strategy, EURO- CRYPT'02, pp.108-109, 2002. ,
DOI : 10.1007/3-540-46035-7_7
The Design of Rijndael: AES ? The Advanced Encryption Standard, 2002. ,
DOI : 10.1007/978-3-662-04722-4
Probability distributions of correlation and differentials in block ciphers, Journal of Mathematical Cryptology, vol.1, issue.3, pp.221-242, 2007. ,
DOI : 10.1515/JMC.2007.011
Related-Key Rectangle Attack of the Full HAS-160 Encryption Mode, INDOCRYPT'09, pp.157-168 ,
DOI : 10.1007/978-3-642-10628-6_11
Memoryless Related-Key Boomerang Attack on the Full Tiger Block Cipher, ISPEC'09, pp.298-309978, 2009. ,
DOI : 10.1007/3-540-48519-8_12
Dependent Linear Approximations: The Algorithm of Biryukov and Others Revisited, CT-RSA'10, pp.318-333978, 2010. ,
DOI : 10.1007/978-3-642-11925-5_22
Known-Key Distinguishers for Some Block Ciphers, ASIACRYPT'07, pp.315-324, 2007. ,
DOI : 10.1007/978-3-540-76900-2_19
Linear Cryptoanalysis Method for DES Cipher, EUROCRYPT'93. pp. 386?397, 1993. ,
Linear approximation of block ciphers, EUROCRYPT'94, pp.439-444, 1994. ,
DOI : 10.1007/BFb0053460
Properties of Linear Approximation Tables, FSE'94, pp.131-136, 1994. ,
The cipher SHARK, FSE'96, pp.99-111, 1996. ,
DOI : 10.1007/3-540-60865-6_47
Generalization of Matsui???s Algorithm 1 to linear hull for key-alternating block ciphers, Designs, Codes and Cryptography, vol.66, issue.1-3, pp.175-193, 2013. ,
DOI : 10.1007/s10623-012-9679-1
Decorrelation: A Theory for Block Cipher Security, Journal of Cryptology, vol.16, issue.4, pp.249-286, 2003. ,
DOI : 10.1007/s00145-003-0220-6
Related-Key Linear Cryptanalysis, 2006 IEEE International Symposium on Information Theory, pp.1609-1613, 2006. ,
DOI : 10.1109/ISIT.2006.261548
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.155.2801
Related-Key Differential-Linear Attacks on Reduced AES-192, INDOCRYPT'07, pp.73-85, 2007. ,
DOI : 10.1007/978-3-540-77026-8_7