1. Aoki, Ichikawa, Kanda, Matsui, Moriai, Nakajima, Tokita, “Specification of Camellia — a 128-bit Block Cipher,”
http://info.isl.ntt.co.jp/camellia/
, 2000.
2. Aoki, “Practical Evaluation of Security against Generalized Interpolation Attack,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E83-A, No.1, pp.33–38, 2000.
3. Aoki, Ueda, “Optimized Software Implementations of E2,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E83-A, No.1, pp.101–105, 2000.
4. Biham, Shamir, “Differential Cryptanalysis of the Data Encryption Standard,” Springer-Verlag, 1993.
5. Biham, “New Types of Cryptanalytic Attacks Using Related Keys,” Journal of Cryptology, Vol.7, No.4, pp.229–246, Springer-Verlag, 1994.