References
- 송정환, 구본욱, '수리계획법을 이용한 S-box의 부울함수 합성' 정보보호학회논문지 14권 4호, pp. 49-59, 2004
- E. Biham and A. Shamir, 'Differential cryptanalysis of DES-like cryptosystems,' Journal of Cryptology, vol. 4, pp. 3-72, 1993
- J. Daemen and V. Rijmen, Submission to NIST AES Process, 1997. http://csrc.nist.gov/CryptoToolkit/aes
- J. Daemen and V. Rijmen, The Design of Rijndael, Springer, 2002
- J. Fuller, W. Millan, 'Linear redundancy in S-boxes,' T. Johansson (Ed.) Fast Software Encryption 2003, LNCS vol. 2887, Springer-Verlag, pp. 74-86, 2003
- G. Gong, S.W. Golomb, 'Transform domain analysis of DES,' IEEE Transactions on Information Theory, vol. 45, no. 6, pp. 2065-2073, Sep., 1999 https://doi.org/10.1109/18.782138
- S.W. Golomb, G. Gong, Signal Design for Good Correlation: for wireless communication, cryptography, and radar, Cambridge University Press, 2005
- T. Jakobsen and L. Knudsen, 'The interpolation attack on block ciphers,' in E. Biham (Ed.) Fast Software Encryption 1997, LNCS vol. 1267, Springer, pp.28-40, 1997
- L. Jing-mei, W. Bao-dian, C. Xiang-guo, W. Xin-mei, 'Cryptanalysis of Rijndael S-box and improvement,' Applied Mathematics and Computation, vol. 170, pp. 958-975, 2005 https://doi.org/10.1016/j.amc.2004.12.043
- Yuan Li and T. W. Cusick, 'Strict Avalanche criterion over finite fields,' http://eprint.iacr.org/2005/361.pdf
- M. Matsui, 'Linear cryptanalysis method for DES cipher,' T. Helleseth (Ed.), Advances in Cryptology: Eurocrypt '93, LNCS vol. 765, Springer, pp. 386-397, 1993
- National Institute of Standards and Technology. The Advanced Encryption Standard, Federal Information Processing Standards Publication (FIPS) 197, 2001. http://csrc.nist.gov/publications/fips
- K. Nyberg, 'Differentially uniform mappings for cryptography,' T. Helleseth (Ed.) Advances in Cryptology - EUROCRYPT '93, LNCS vol. 765, Springer, pp. 55-64, 1994
- R. A. Rueppel, Analysis and Design of Stream Ciphers, Springer-Verlag, 1986
- C. E. Shannon, 'Communication theory of secrecy systems,' Bell Systems Technical Journal, vol. 28, pp. 656-715, 1949 https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
- A.F. Webster and S.E. Tavares, 'On the design of S-box,' In: H.C. Williams (Ed.), Advances in Cryptology: Crypto '85, LNCS vol. 218, Springer-Verlag, 1986, pp. 523-534
- A. M. Youssef and G. Gong, 'On the interpolation attacks on block ciphers,' in B. Schneier (Ed.) Fast Software Encryption 2000, LNCS vol. 1978, Springer, pp.109-120, 2001
- A. M. Youssef, S. E. Tavares, 'Affine equivalence in the AES round function,' Discrete Applied Mathematics, vol. 148, pp. 161-170, 2005 https://doi.org/10.1016/j.dam.2005.02.001
- National Bureau of Standards, The Data Encryption Standard, Federal Information Processing Standards Publication (FIPS) 46, 1977
- Howard M. Heys, 'A tutorial on linear and differential cryptanalysis,' Technical Report, CORR 2001-17, University of Waterloo, Waterloo, Canada, 2001