Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms-Design and Analysis, Selected Areas in Cryptography-SAC 2000, vol.2012, pp.39-56, 2000. ,
, Impossible Differential Attack on Seven-Round AES-128, vol.2, pp.28-32, 2008.
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials, EUROCRYPT'99, vol.1592, pp.12-23, 1999. ,
, Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE. In: Fast Software Encryption-FSE 2015, vol.9054, pp.3-27, 2015.
Impossible differential attack on 13-round Camellia-192, Inf. Process. Lett, vol.115, issue.9, pp.660-666, 2015. ,
Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks Using the Matrix Method, FSE 2015, vol.9054, pp.92-113, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01199221
Biclique Cryptanalysis of the Full AES, ASIACRYPT'11, vol.7073, pp.344-371, 2011. ,
PRESENT: An Ultra-Lightweight Block Cipher, CHES 2007, vol.4727, pp.450-466, 2007. ,
Improved Impossible Differential Attacks against Round-Reduced LBlock. IACR Cryptology ePrint Archive, vol.279, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01068887
, Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon. In: ASIACRYPT'14 (I), vol.8873, pp.179-199, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01068894
, Note on Impossible Differential Attacks. In: Fast Software EncryptionFSE 2016, vol.9783, pp.416-427, 2016.
Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES, Fast Software Encryption-FSE 2013, vol.8424, pp.541-560, 2013. ,
Improved Key Recovery Attacks on ReducedRound AES in the Single-Key Setting, EUROCRYPT'13, vol.7881, pp.371-387, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-01094304
, Announcing the Advanced Encryption Standard (AES), FIPS, vol.197, 2001.
, The LED Block Cipher, vol.6917, pp.326-341, 2011.
Multiple Limited-Birthday Distinguishers and Applications, SAC'13, vol.8282, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-00870452
, Truncated Differential Attacks on 8-Round CRYPTON. In: ICISC 2003, vol.2971, pp.446-456, 2004.
DEAL-A 128-bit cipher, 1998. ,
, New Block Cipher: ARIA. In: ICISC 2003, vol.2971, pp.432-445, 2004.
Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia, Fast Software Encryption-FSE 2015, vol.9054, pp.48-70, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01256208
, New Impossible Differential Cryptanalysis of ARIA. Cryptology ePrint Archive, 2008.
Improved Impossible Differential Cryptanalysis of ARIA, pp.129-132, 2008. ,
Improved Results of Impossible Differential Cryptanalysis on Reduced FOX, Comput. J, vol.59, issue.4, pp.541-548, 2016. ,
A Revised Version of Crypton-Crypton V1.0, FSE'99, vol.1636, pp.31-45, 1999. ,
, New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia. In: FSE'12, vol.7549, pp.90-109, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00922229
Linear cryptanalysis of aria block cipher, Information and Communications Security, vol.7043, pp.242-254, 2011. ,
, New Impossible Differential Attacks on AES. In: INDOCRYPT'08, vol.5365, pp.279-293, 2008.
, , 2014.
, Improved Impossible Differential Cryptanalysis of 7-Round AES-128. In: INDOCRYPT'10, vol.6498, pp.282-291, 2010.
, New impossible differential attacks on reduced-round Crypton, vol.32, pp.222-227, 2010.
Stochastic Cryptanalysis of Crypton, FSE 2000, vol.1978, pp.121-133, 2001. ,
, Improving impossible-differential attacks against Rijndael-160 and Rijndael-224. Designs, Codes and Cryptography, pp.1-13, 2016.
On computational complexity of impossible differential cryptanalysis, Inf. Process. Lett, vol.114, issue.5, pp.252-255, 2014. ,
, The 128-Bit Blockcipher CLEFIA (Extended Abstract). In: Fast Software Encryption-FSE 2007, vol.4593, pp.181-195, 2007.
Cryptanalysis of CLEFIA using multiple impossible differentials, ISITA'08, pp.1-6, 2008. ,
LBlock: A Lightweight Block Cipher, ACNS 2011, vol.6715, pp.327-344, 2011. ,
Impossible Differential Cryptanalysis of ReducedRound ARIA and Camellia, J. Comput. Sci. Technol, vol.22, issue.3, pp.449-456, 2007. ,
Song: Related-key Impossible Differential Analysis of Full Khudra. IACR Cryptology ePrint Archive, vol.840, 2015. ,
, New Results on Impossible Differential Cryptanalysis of Reduced AES. In: ICISC'07, vol.4817, pp.239-250, 2007.