Biham, E. (1995). “On Matsui's linear cryptanalysis.” Advances in Cryptology—EUROCRYRT'94, Lecture Notes in Computer Science, vol. 950, ed. A. De Santis. Springer-Verlag, Berlin, 341–355.
Google Scholar
Biryukov, A., C. De Cannière, M. Quisquater (2004). “On Multiple Linear Approximations", Advances in Cryptology, proceedings of CRYPTO 2004, Lecture Notes in Computer Science 3152, ed. M. Franklin. Springer-Verlag, 1–22.
Google Scholar
Desmedt, Y. ed. (1994). Advances in Cryptology—CRYPTO'94, Lecture Notes in Computer Science, vol. 839, ed. Y.G. Desmedt. Springer-Verlag, Berlin.
Google Scholar
Harpes, C. and J.L. Massey (1997). “Partitioning cryptanalysis.” Fast Software Encryption, FSE'97, Lecture Notes in Computer Science, vol. 1267, ed. E. Biham. Springer-Verlag, Berlin, 13–27.
Google Scholar
Hong, S., S. Lee, J. Lim, J. Sung, D. Cheon, and I. Cho (2000). “Provable security against differential and linear cryptanalysis for the SPN structure.” Proceedings of Fast Software Encryption—FSE 2000, Lecture Notes in Computer Science, vol. 1978, ed. B. Schneier. Springer-Verlag, Berlin, 273–283.
Google Scholar
Junod, P. and S. Vaudenay (2003). “Optimal key ranking procedures in a statistical cryptanalysis.” Fast Software Encryption, FSE 2003, Lecture Notes in Computer Science, vol. 2887, ed. T. Johansson. Springer-Verlag, Berlin, 1–15.
Google Scholar
Kaliski, B.S. and M.J. Robshaw (1994). “Linear cryptanalysis using multiple approximations.” Advances in Cryptography—CRYPTO'94, Lecture Notes in Computer Science, vol. 839, ed. Y. Desmedt. Springer-Verlag, Berlin, 26–39.
Google Scholar
Keliher, L., H. Meijer, and S.E. Tavares (2001). “New method for upper bounding the maximum average linear hull probability for SPNs.” EUROCRYPT 2001, Lecture Notes in Computer Science, vol. 2045, ed. B. Pfitzmann. Springer-Verlag, Berlin, 420–436.
Google Scholar
Knudsen, L.R. and J.E. Mathiassen (2001). “A chosen-plaintext linear attack on DES.” Fast Software Encryption, FSE 2000, Lecture Notes in Computer Science, vol. 1978, ed. B. Schneier. Springer-Verlag, Berlin, 262–272.
Google Scholar
Knudsen, L.R. and W. Meier (2000). “Correlations in RC6 with a reduced number of rounds.” Proceedings of Fast Software Encryption—FSE 2000, Lecture Notes in Computer Science, vol. 1978, ed. B. Schneier. Springer-Verlag, Berlin, 94–108.
Google Scholar
Knudsen, L.R. and M.J.B. Robshaw (1996). “Non-linear approximations in linear cryptanalysis.” Advances in Cryptology—EUROCRYPT'96, Lecture Notes in Computer Science, vol. 1070, ed. U. Maurer. Springer-Verlag, Berlin, 224–236.
Google Scholar
Matsui, M. (1993). “Linear cryptanalysis method for DES cipher.” Advances in Cryptology—EUROCRYPT'93, Lecture Notes in Computer Science, vol. 765, ed. T. Helleseth. Springer-Verlag, Berlin, 386–397.
Google Scholar
Matsui, M. and A. Yamagishi (1993). “A new method for known plaintext attack of FEAL cipher.” Advances in Cryptography—EUROCRYPT'92, Lecture Notes in Computer Science, vol. 658, ed. R.A. Rueppel. Springer-Verlag, Berlin, 81–91.
Google Scholar
Matsui, M. (1994). “The first experimental cryptanalysis of the data encryption standard.” Advances in Cryptography—CRYPTO'94, Lecture Notes in Computer Science, vol. 839, ed. Y.G. Desmedt. Springer-Verlag, Berlin, 1–11.
Google Scholar
Matsui, M. “On correlation between the order of S-boxes and the strength of DES.” Advances in Cryptology—EUROCRYPT'94, Lecture Notes in Computer Science, vol. 950, ed. A. De Santis. Springer-Verlag, Berlin, 366–375.
Google Scholar
Nyberg, K. (1994). “Linear approximations of block ciphers.” Advances in Cryptography—EUROCRYPT'94, Lecture Notes in Computer Science, vol. 950, ed. A. De Santis. Springer-Verleg, Berlin, 439–444.
Google Scholar
Nyberg, K. and L.R. Knudsen (1995). “Provable security against a differential attack,” Journal of Cryptology, 8 (1), 27–38.
Article
MATH
MathSciNet
Google Scholar
Santis, A.D., ed. (1995). Advances in Cryptology—EUROCRYPT'94, Lecture Notes in Computer Science, vol. 950, ed. A. De Santis. Springer-Verlag, Berlin.
Google Scholar
Selcuk, A.A. (2002). “On probability of success in differential and linear cryptanalysis.” Technical Report, Network Systems Lab, Department of Computer Science, Purdue University, 2002. Previously published at SCN 2002.
Google Scholar
Shimoyama, T. and T. Kaneko (1998). “Quadratic relation of S-box and its application to the linear attack of full round des.” Advances in Cryptology—CRYPTO'98, Lecture Notes in Computer Science, vol. 1462, ed. H. Krawczyk. Springer-Verlag, Berlin, 200–211.
Google Scholar
Shimoyama, T., S. Moriai, T. Kaneko, and S. Tsujii (1999). “Improved higher order differential attack and its application to Nyberg-Knudsen's designed block cipher.” IEICE Transactions on Fundamentals, E82-A (9), 1971–1980. http://search.ieice.or.jp/1999/files/e000a09.htm#e82-a,9,1971
Google Scholar
Vaudenay, S. (1996). “On the weak keys of blowfish.” Fast Software Encryption, FSE'96, Lecture Notes in Computer Science, vol. 1039, ed. D. Gollmann. Springer-Verlag, Berlin, 27–32.
Google Scholar
Vaudenay, S. (2003). “Decorrelation: A theory for block cipher security.” Journal of Cryptology, 16 (4), 249–286.
Article
MATH
MathSciNet
Google Scholar
Wagner, D. (1999). “The boomerang attack.” In Fast Software Encryption, FSE'99, Lecture Notes in Computer Science, vol. 1636, ed. L.R. Knudsen. Springer-Verlag, Berlin, 156–170.
Google Scholar