Voir la notice de l'article provenant de la source Math-Net.Ru
[1] Malyshev F. M., “Dvoistvennost raznostnogo i lineinogo metodov v kriptografii”, Matematicheskie voprosy kriptografii, 5:3 (2014), 35–47
[2] Malyshev F. M., Trifonov D. I., “Rasseivayuschie svoistva XSLP-shifrov”, Matematicheskie voprosy kriptografii, 7:3 (2016), 47–60
[3] Barreto P. S. L. M., Rijmen V., “The Anubis Block Cipher”, NESSIE, 2000 (to appear)
[4] Biryukov A., Nikolic I., “Automatic search for related-key differential characteristics in byteoriented block ciphers: applications to AES, Camellia, Khazad and others”, Lect. Notes Comput. Sci., 6110, 2010, 322–344 | DOI | MR | Zbl
[5] Borst J., “The Block Cipher: GrandCru”, NESSIE, 2000 (to appear)
[6] Daemen J., Knudsen L., Rijmen V., “The Block Cipher Square”, Lect. Notes Comput. Sci., 1267, 1997, 149–165 | DOI
[7] Daemen J., Rijmen V., “The Block Cipher BKSQ”, Lect. Notes Comput. Sci., 1820, 2000, 236–245 | DOI
[8] Daemen J., Rijmen V., The Design of Rijndael: AES — The Advanced Encryption Standard, Springer, Heidelberg etc., 2002, 238 pp. | MR | Zbl
[9] Fouque P.-A., Jean J., Peyrin T., “Structural evaluation of AES and chosen-key distinguisher of 9-round AES-128”, Lect. Notes Comput. Sci., 8042, 2013, 183–203 | DOI | Zbl
[10] Lim C., “A revised version of Crypton: Crypton v1.0”, Lect. Notes Comput. Sci., 1636, 1999, 31–45 | DOI | Zbl
[11] Mouha N., Wang Q., Gu D., Preneel B., “Differential and linear cryptanalysis using mixedinteger linear programming”, Lect. Notes Comput. Sci., 7537, 2012, 57–76 | DOI | Zbl