New Types of Cryptanalytic Attacks using Related Keys, Advances in Cryptology -EUROCRYPT 1993, pp.398-409, 1993. ,
Related-Key Boomerang and Rectangle Attacks, Eurocrypt 2005, pp.507-525, 2005. ,
DOI : 10.1007/11426639_30
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.80.6075
Related-Key Cryptanalysis of the Full AES-192 and AES-256, Asiacrypt 2009, pp.1-18, 2009. ,
DOI : 10.1007/978-3-642-10366-7_1
Distinguisher and Related-Key Attack on the Full AES-256, Crypto 2009, pp.231-249, 2009. ,
DOI : 10.1007/978-3-642-03356-8_14
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.3114
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds, 2009. ,
DOI : 10.1007/978-3-642-13190-5_15
Slide Attacks, FSE 1999, pp.245-259, 1999. ,
DOI : 10.1007/3-540-48519-8_18
Advanced Slide Attacks, Eurocrypt 2000, pp.589-606, 2000. ,
DOI : 10.1007/3-540-45539-6_41
Rijndael " , First Advanced Encryption Standard Conference, 1998. ,
Improved Cryptanalysis of Rijndael, LNCS, pp.213-230, 1978. ,
DOI : 10.1007/3-540-44706-7_15
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.36.2239
Related- Key Boomerang and Rectangle Attacks, p.19, 2010. ,
Strengthening the Key Schedule of the AES, ACISP 2002, pp.226-240, 2002. ,
DOI : 10.1007/3-540-45450-0_19
A Compact Rijndael Hardware Architecture with S-Box Optimization, ASIACRYPT 2001, pp.239-254, 2001. ,
DOI : 10.1007/3-540-45682-1_15
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.8388
The Boomerang Attack, FSE 1999, pp.156-170, 1999. ,
DOI : 10.1007/3-540-48519-8_12
Related-Cipher Attacks, ICICS 2002, pp.447-455, 2002. ,
DOI : 10.1007/3-540-36159-6_38