Biham, E., A. Biryukov, and A. Shamir (1999). “Miss in the middle attacks on IDEA and Khufu.” Fast Software Encryption, FSE'99, Lecture Notes in Computer Science, vol. 1636, ed. L.R. Knudsen. Springer-Verlag, Berlin, 124–138.
Google Scholar
Biryukov, A., J.N. Jr., B. Preneel, and J. Vandewalle (2002). “New weak-key classes of IDEA.” International Conference on Information and Communications Security, ICICS 2002, Lecture Notes in Computer Science, vol. 2513, eds. R.H. Deng, S. Qing, F. Bao, and J. Zhou. Springer-Verlag, Berlin, 315–326.
Google Scholar
Borst, J., L.R. Knudsen, and V. Rijmen (1997). “Two attacks on reduced IDEA (extended abstract).” Advances in Cryptology—Eurocrypt'97, Lecture Notes in Computer Science, vol. 1233, ed. W. Fumy. Springer-Verlag, Berlin, 1–13.
Google Scholar
Daemen, J., R. Govaerts, and J. Vandewalle (1993). “Cryptanalysis of 2.5 rounds of IDEA (extended abstract).” Technical Report 93/1, Department of Electrical Engineering, ESAT-COSIC.
Google Scholar
Daemen, J., R. Govaerts, and J. Vandewalle (1994). “Weak keys for IDEA.” Advances in Cryptology—CRYPTO'93, Lecture Notes in Computer Science, vol. 773, ed. D.R. Stinson. Springer-Verlag, Berlin, 224–231.
Google Scholar
Demirci, H., A. Selccuk, and E. Türe (2004). “A new meet-in-the-middle attack on the IDEA block cipher.” Selected Areas in Cryptography, SAC 2003, Lecture Notes in Computer Science, vol. 3006, eds. M. Matsui and R. Zuccherato. Springer-Verlag, Berlin.
Google Scholar
Hawkes, P. (1998). “Differential–linear weak key classes of IDEA.” Advances in Cryptology—EUROCRYPT'98, Lecture Notes in Computer Science, vol. 1403, ed. K. Nyberg. Springer-Verlag, Berlin, 112–126.
Google Scholar
Hawkes, P. and L. O'Connor (1996). “On applying linear cryptanalysis to IDEA.” Advances in Cryptography—ASIACRYPT'96, Lecture Notes in Computer Science, vol. 1163, eds. K. Kim and T. Matsumoto. Springer-Verlag, Berlin, 105–115.
Google Scholar
Kelsey, J., B. Schneier, and D. Wagner (1996). “Key-schedule cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES.” Advances in Cryptology—CRYPTO'96, Lecture Notes in Computer Science, vol. 1109, ed. N. Koblitz. Springer-Verlag, Berlin, 237–251.
Google Scholar
Lai, X. (1992). “On the Design and Security of Block Ciphers.” Doctoral Dissertation, Swiss Federal Institute of Technology, Zurich.
Google Scholar
Lai, X. and J.L. Massey (1990). “A proposal for a new block encryption standard.” Advances in Cryptology—EUROCRYPT'90, Lecture Notes in Computer Science, vol. 473, ed. I.B. Damgard. Springer-Verlag, Berlin, 389–404.
Google Scholar
Lai, X., J.L. Massey, and S. Murphy (1991). “Markov ciphers and differential cryptanalysis.” Advances in Cryptology—EUROCRYPT'91, Lecture Notes in Computer Science, vol. 547, ed. D.W. Davies. Springer-Verlag, Berlin, 17–38.
Google Scholar
Meier, W. (1993). “On the security of the IDEA block cipher.” Advances in Cryptology—EUROCRYPT'93, Lecture Notes in Computer Science, vol. 765, ed. T. Helleseth. Springer-Verlag, Berlin, 371–385.
Google Scholar