Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms ??? Design andAnalysis, Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography, SAC '00, pp.39-56, 2001. ,
DOI : 10.1007/3-540-44983-3_4
Enhancing Differential-Linear Cryptanalysis, Advances in Cryptology -ASIACRYPT 2002, pp.254-266, 2002. ,
DOI : 10.1007/3-540-36178-2_16
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.4740
Differential cryptanalysis of the data encryption standard, 1993. ,
DOI : 10.1007/978-1-4613-9314-6
The Boomerang Attack on 5 and 6-Round Reduced AES, AES Conference, pp.11-15, 2004. ,
DOI : 10.1007/11506447_2
The Design of Rijndael: AES -The Advanced Encryption Standard, 2002. ,
DOI : 10.1007/978-3-662-04722-4
The block cipher Square, Fast Software Encryption (FSE'97, pp.149-165, 1997. ,
DOI : 10.1007/BFb0052343
A Meet-in-the-Middle Attack on 8-Round AES, Fast Software Encryption, pp.116-126, 2008. ,
DOI : 10.1007/978-3-540-71039-4_7
Improved Cryptanalysis of Rijndael, Fast Software Encryption, pp.213-230, 1978. ,
DOI : 10.1007/3-540-44706-7_15
Higher Order Differential Attack of Camellia(II) ,
DOI : 10.1007/3-540-36492-7_10
Square Attack on Reduced Camellia Cipher, Proceedings of the Third International Conference on Information and Communications Security, pp.238-245, 2001. ,
DOI : 10.1007/3-540-45600-7_27
A Collision Attack on 7 Rounds of Rijndael, AES Candidate Conference, pp.230-241, 2000. ,
Truncated and higher order differentials, Fast Software Encryption (FSE'94), pp.196-211, 1995. ,
DOI : 10.1007/3-540-60590-8_16
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.34.4730
Differential-Linear Cryptanalysis, Advances in Cryptology -CRYPTO '94, pp.17-25, 1994. ,
DOI : 10.1007/3-540-48658-5_3
Linear Cryptanalysis Method for DES Cipher, Workshop on the theory and application of cryptographic techniques on Advances in cryptology, EUROCRYPT '93, pp.386-397, 1994. ,
DOI : 10.1007/3-540-48285-7_33
On Probability of Success in Linear and Differential Cryptanalysis, J. Cryptology, vol.21, issue.1, pp.131-147, 2008. ,
The Boomerang Attack, Fast Software Encryption (FSE'99), volume 1636 of LNCS, pp.156-170, 1999. ,
DOI : 10.1007/3-540-48519-8_12
Integral Cryptanalysis and Higher Order Differential Attack, Trends in Mathematics (ICMS), vol.8, issue.1, pp.101-118, 2005. ,
New Results on Impossible Differential Cryptanalysis of Reduced AES, Information Security and Cryptology (ICISC) 2007, pp.239-250, 2007. ,
DOI : 10.1007/978-3-540-76788-6_19