E. Biham, New Types of Cryptanalytic Attacks using Related Keys, Advances in Cryptology -EUROCRYPT 1993, pp.398-409, 1993.

E. Biham, O. Dunkelman, and N. Keller, Related-Key Boomerang and Rectangle Attacks, Eurocrypt 2005, pp.507-525, 2005.
DOI : 10.1007/11426639_30

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.80.6075

A. Biryukov and D. Khovratovich, Related-Key Cryptanalysis of the Full AES-192 and AES-256, Asiacrypt 2009, pp.1-18, 2009.
DOI : 10.1007/978-3-642-10366-7_1

A. Biryukov, D. Khovratovich, and I. Nikolic, Distinguisher and Related-Key Attack on the Full AES-256, Crypto 2009, pp.231-249, 2009.
DOI : 10.1007/978-3-642-03356-8_14

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.3114

A. Biryukov, O. Dunkelman, N. Keller, D. Khovratovich, and A. Shamir, Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds, 2009.
DOI : 10.1007/978-3-642-13190-5_15

A. Biryukov and D. Wagner, Slide Attacks, FSE 1999, pp.245-259, 1999.
DOI : 10.1007/3-540-48519-8_18

A. Biryukov and D. Wagner, Advanced Slide Attacks, Eurocrypt 2000, pp.589-606, 2000.
DOI : 10.1007/3-540-45539-6_41

J. Daemen and V. Rijmen, Rijndael " , First Advanced Encryption Standard Conference, 1998.

N. Ferguson, J. Kelsey, S. Lucks, B. Schneier, M. Stay et al., Improved Cryptanalysis of Rijndael, LNCS, pp.213-230, 1978.
DOI : 10.1007/3-540-44706-7_15

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.36.2239

J. Kim, S. Hong, B. Preneel, E. Biham, O. Dunkelman et al., Related- Key Boomerang and Rectangle Attacks, p.19, 2010.

L. May, M. Henricksen, W. Millan, G. Carter, and E. Dawson, Strengthening the Key Schedule of the AES, ACISP 2002, pp.226-240, 2002.
DOI : 10.1007/3-540-45450-0_19

A. Satoh, S. Morioka, and S. Munetoh, A Compact Rijndael Hardware Architecture with S-Box Optimization, ASIACRYPT 2001, pp.239-254, 2001.
DOI : 10.1007/3-540-45682-1_15

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.8388

D. Wagner, The Boomerang Attack, FSE 1999, pp.156-170, 1999.
DOI : 10.1007/3-540-48519-8_12

H. Wu, Related-Cipher Attacks, ICICS 2002, pp.447-455, 2002.
DOI : 10.1007/3-540-36159-6_38