References
- 한국정보보호진흥원, "128비트 블록암호 알고리즘(SEED) 개발 및 분석 보고서", 2003.
- 한국정보보호진흥원, "블록암호 알고리즘 SEED-192/256 개발", 2008.
- E. Biham, "New Types of Cryptanalytic Attacks Using Related Keys", Journal of Cryptology, Vol. 7, No. 4, pp. 229-246, Springer-Verlag, 1994.
- E. Biham, O. Dunkelman and N. Keller, "Related-Key Boomerang and Rectangle Attacks", EUROCRYPT'05, LNCS 3494, pp. 507-525, Springer- Verlag, 2005.
- A. Biryukov, J. Nakahara J., B. Preneel, J. Vandewalle, "New Weak-Key Class of IDEA", ICICS'02, LNCS 2513, pp. 315-326, Springer-Verlag, 2002.
- J. Kim, S. Hong and B. Preneel, "Related-Key Rectangle Attacks on Reduced AES-192 and AES-256", FSE'07, LNCS 4593, pp. 225-241, Springer-Verlag, 2007.
- J. Kim, G. Kim, S. Hong, S. Lee and D. Hong, "The Related-Key Rectangle Attack - Application to SHACAL-1", ACISP'04, LNCS 3108, pp. 123-136, Springer-Verlag, 2004.
- E. Lee, J. Kim, D. Hong, C. Lee, J. Sung and S. Hong, "Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks", IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E91-A, No. 2, pp. 642-649, 2008. https://doi.org/10.1093/ietfec/e91-a.2.642
- National Bureau of Standards, "Data Encryption Standard", Federal Information Processing Standards Publication 46, Jan. 1977.
- National Institue of Standards and Technology, "Advanced Encryption Standard", Federal Information Processing Standards Publications, No. 197, 2001.