共 9 条
[1]
Hernandez J.C., Isasi P., Finding efficient distinguishes for cryptographic mappings, with an application to the block cipher TEA, Proc. of the 2003 Congress on Evolutionary Computation CEC 2003, pp. 341-348, (2003)
[2]
Knudsen L., Meier W., Correlations in RC6 with a reduced number of rounds, Proc. of the Seventh East Software Encryption Workshop, (2000)
[3]
Shimoyama T., Takeuchi K., Hayakawa J., Correlation attack to the block cipher RC5 and the simplified variants of RC6, Proc. of the Third AES Candidate Conference AES3, (2000)
[4]
Wheeler D., Needham R., TEA, a tiny encryption algorithm, Proc. of the 1995 Fast Software Encryption Workshop, pp. 97-110, (1995)
[5]
Wagner D., Kelsey J., Schneier B., Related-key cryptoanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2 and TEA, Proc. of the ICICS'97 Conference, pp. 233-246, (1997)
[6]
Moon D., Kyungdeok H., Wonil L., Et al., Impossible differential crypt-analysis of reduced round XTEA and TEA, Proc. of the Fast Software Encryption, FSE 2002, 2365, pp. 49-60, (2002)
[7]
Kelsey J., Schneier B., Wagner D., Mod n Cryptoanalysis with applications against RC5P and M6, Proc. of the 1999 Fast Software Encryption Workshop, pp. 139-155, (1999)
[8]
Forre R., The strict avalanche criterion: Special properties of boolean functions and extended definition, Advances in Cryptology-Proc. of CRYPTO'88, LNCS, 403, pp. 450-468, (1988)
[9]
Biham E., Biryukov A., Shamir A., Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials, Technion Computer Science Department Technical Report CS0947, (1998)