Voir la notice de l'article provenant de la source Math-Net.Ru
[1] Barreto P. S. L. M., Rijmen V., “The Khazad legacy-level block cipher”, Proceedings of First Open NESSIE Workshop, KU Leuven, Leuven, 2000 https://www.cosic.esat.kuleuven.be/nessie/workshop/submissions.html
[2] Biryukov A., “Analysis of involutional ciphers: Khazad and Anubis”, Fast Software Encryption, FSE 2003, Lect. Notes Comput. Sci., 2887, 2003, 45–53 | DOI | Zbl
[3] Birukov A., Nikolic I., “Automatic search for related-key differential characteristics in byteoriented block ciphers: Application to AES, Camellia, Khazad and others”, Advances in Cryptology-EUROCRYPT 2010, Lect. Notes Comput. Sci., 6110, 2010, 322–344 | DOI | MR
[4] Leander G., Abdelraheem M. A., Alkhzaimi H., Zenner E., “A cryptanalysis of PRINT cipher: The invariant subspace attack”, Advances in Cryptology-EUROCRYPT 2011, Lect. Notes Comput. Sci., 6841, 2011, 206–221 | DOI | MR | Zbl
[5] Müller F., “A new attack against Khazad”, Advances in Cryptology-ASIACRYPT 2003, Lect. Notes Comput. Sci., 2894, 2003, 347–358 | DOI | MR | Zbl
[6] Pogorelov B. A., Fundamentals of the Theory of Permutation Groups, v. 1, General Aspects, M., 1986, 316 pp. (in Russian)
[7] Discrete Math. Appl., 24:2 (2014), 95–108 | DOI | DOI | MR | MR | Zbl | Zbl
[8] Pogorelov B. A., Pudovkina M. A., “Factor structures of transformations”, Matematicheskie voprosy kriptografii (Math. Aspects Cryptogr.), 3:3 (2012), 81–104 (In Russian) | MR
[9] Pogorelov B. A., Pudovkina M. A., “Combinatorical characterization of XL-layers”, Matematicheskie voprosy kriptografii (Math. Aspects Cryptogr.), 4:3 (2013), 99–129 (In Russian) | MR
[10] Yonglong T., “New Cryptanalysis on 6-round Khazad”, Adv. Inf. Sci. Serv. Sci., 5:1 (2013), 94–103