Biham E, Shamir A (1993) Differential cryptanalysis of the data encryption standard. Springer, Berlin
BookÂ
MATHÂ
Google ScholarÂ
Biryukov A, Wagner D (1999) Slide attacks. In: Knudsen LR (ed) Fast software encryption, sixth international workshop, Rome, March 1999. Lecture notes in computer science, vol 1636. Springer, Berlin, pp 245–259
Google ScholarÂ
Daemen J, Knudsen L, Rijmen V (1997) The block cipher Square. In: Biham E (ed) Fast software encryption, fourth international workshop, Haifa, January 1997. Lecture notes in computer science, vol 1267. Springer, Berlin, pp 149–165
Google ScholarÂ
Hellman M (1980) A cryptanalytic time-memory trade-off. IEEE Trans Inform Theory IT-26(4):401–406
ArticleÂ
MATHÂ
MathSciNetÂ
Google ScholarÂ
Hellman ME, Langford SK (1994) Differential–linear cryptanalysis. In: Desmedt Y (ed) Advances in cryptology: CRYPTO’94, Lecture notes in computer science, vol 839. Springer, Berlin, pp 26–39
Google ScholarÂ
Kilian J, Rogaway P (2001) How to protect DES against exhaustive key search (an analysis of DESX). J Cryptol 14(1):17–35
ArticleÂ
MATHÂ
MathSciNetÂ
Google ScholarÂ
Knudsen LR (1995) Truncated and higher order differentials. In: Preneel B (ed) Fast software encryption – second international workshop, Leuven. Lecture notes in computer science, vol 1008. Springer, Berlin, pp 196–211
Google ScholarÂ
Knudsen LR (1999) Contemporary block ciphers. In: Damgård I (ed) Lectures on data security, modern cryptology in theory and practice, Summer School, Aarhus, July 1998. Lecture notes in computer science, vol 1561. Springer, Berlin, pp 105–126
Google ScholarÂ
Lai X (1994) Higher order derivatives and differential cryptanalysis. In: Blahut R (ed) Communication and cryptography, two sides of one tapestry. Kluwer, Dordrecht. ISBN 0-7923-9469-0
Google ScholarÂ
Lai X, Massey JL, Murphy S (1992) Markov ciphers and differential cryptanalysis. In: Davies DW (ed) Advances in cryptology – EUROCRYPT’91, Lecture notes in computer science, vol 547. Springer, Berlin, pp 17–38
Google ScholarÂ
Matsui M (1993) Linear cryptanalysis method for DES cipher. In: Helleseth T (ed) Advances in cryptology – EUROCRYPT’93, Lecture notes in computer science, vol 765. Springer, Berlin, pp 386–397
Google ScholarÂ
Matsui M (1994) The first experimental cryptanalysis of the data encryption standard. In: Desmedt YG (ed) Advances in cryptology – CRYPTO’94, Lecture notes in computer science, vol 839. Springer, Berlin, pp 1–11
Google ScholarÂ
National Bureau of Standards (1977) Data encryption standard. Federal Information Processing Standard (FIPS), Publication 46, National Bureau of Standards, U.S. Department of Commerce, Washington, DC
Google ScholarÂ
NIST (2001) Advanced encryption standard. FIPSÂ 197, US Department of Commerce, Washington, DC
Google ScholarÂ
Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Technol J 28:656–715
MATHÂ
MathSciNetÂ
Google ScholarÂ
Tuchman W (1979) Hellman presents no shortcut solutions to DES. IEEE Spectr 16(7):40–41
Google ScholarÂ
van Oorschot PC, Wiener MJ (1999) Parallel collision search with cryptanalytic applications. J Cryptol 12(1):1–28
ArticleÂ
MATHÂ
Google ScholarÂ
Vaudenay S (1995) An experiment on DES – statistical cryptanalysis. In: Proceedings of the 3rd ACM conferences on computer security, New Delhi. ACM Press, New York, pp 139–147
Google ScholarÂ
Vaudenay S (2003) Decorrelation: a theory for block cipher security. J Cryptol 16(4):249–286
ArticleÂ
MATHÂ
MathSciNetÂ
Google ScholarÂ
Wagner D (1999) The boomerang attack. In: Knudsen LR (ed) Fast software encryption, sixth international workshop, Rome, March 1999, Lecture notes in computer science, vol 1636. Springer, Berlin, pp 156–170
Google ScholarÂ