@incollection{, 510498F15A0A1BF705B197EE0E564D21 , author={{GulomTuychiev} and {National University of Uzbekistan,}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1543341 } @book{b0, , title={{A Novel Impossible Di_erential Cryptanalysis of AES // proceedings of the Western European Workshop on Research in Cryptology}} , author={{ BBahrak } and { AMReza }} , year={2007. 2007} , address={Bochum, Germany} } @incollection{b1, , title={{Impossible Di_erential Attack on Seven-Round AES-128}} , author={{ BBahrak } and { AMReza }} , journal={{IET Information Security journal}} 2 2 2832 , year={2008} , note={IET} } @incollection{b2, , title={{Miss-in-the-Middle Attacks on IDEA}} , author={{ EBiham } and { ABiryukov } and { AShamir }} , booktitle={{Khufu and Khafre // 6th Fast Software Encryption Workshop}} , editor={ LRKnud-Sen } , publisher={Springer-Verlag} , year={1999} 1636 124138 } @book{b3, , title={{Cryptanalysis of Reduced Variants of Rijndael // unpublished manuscript}} , author={{ EBiham } and { NKeller }} , year={1999} } @book{b4, , title={{Di_erential-Linear Cryptanalysis of IDEA // Department of Electrical Engineering}} , author={{ JBorst }} 96/2 , note={Technical Report} , note={14 pages} } @incollection{b5, , author={{ JBorst } and { LKnudsen } and { VRijmen }} , booktitle={{Advances in Cryptology, Eurocrypt97, LNCS 1233, W. Fumy}} , publisher={Springer-Verlag} , year={1997} 113 } @incollection{b6, , title={{}} , journal={{Chen J. Personal communications}} , year={August 2008} } @incollection{b7, , title={{A New Method for Impossible Di_erential Cryptanalysis of 7-round Advanced Encryption Standard}} , author={{ JChen } and { YHu } and { YWei }} , booktitle={{Proceedings of International Conference on Communications, Circuits and Systems Proceedings}} International Conference on Communications, Circuits and Systems Proceedings , publisher={IEEE} , year={2006. 2006} 3 } @incollection{b8, , title={{A New Method for Impossib le Di_erential cryptanalysis of 8-Round}} , author={{ JChen } and { YHu } and { YWei }} , booktitle={{Lecture Notes in Computer Science: Authors' Instructions 13\}} , year={2006} 11 Adanced Encryption Standard // Wuhan Univeristy Journan of NationalSciences } @incollection{b9, , title={{Impossible di_erential cryptanalysis of Advanced Encryption Standard}} , author={{ JChen } and { YHu } and { YZhang }} , journal={{Science in China Series F: Information Sciences}} 50 3 342350 , year={2007} , publisher={Springer-Verlag} } @incollection{b10, , title={{Improved Impossible Di_erential Cryptanalysis of Rijndael and Crypton // proceedings of Information Security and Cryptology ICISC}} , author={{ JCheon } and { MKim } and { KKim } and { J-YLee } and { SKang }} , booktitle={{Lecture Notes in Computer Science}} 2288 3949 , year={2001. 2002} , publisher={Springer} } @book{b11, , title={{Cryptanalysis of 2.5 Rounds of IDEA (Extended Abstract) // Department of Electrical Engineering}} , author={{ JDaemen } and { RGovaerts } and { JVandewalle }} 93/1 , year={Mar. 1993} 16 , note={Technical Report} } @book{b12, , title={{AES proposal: Rijndael, version 2}} , author={{ JDaeman } and { VRijmen }} , year={1999} } @incollection{b13, , title={{A Meet-in-the-Middle Attack on 8-Round AES // proceedings of Fast Software Encryption 15}} , author={{ HDemirci } and { ASelcuk }} , booktitle={{Lecture Notes in Computer Science}} 5806 116126 , year={2008} , publisher={Springer} } @book{b14, , author={{ NFerguson } and { JKelsey } and { SLucks } and { BSchneier } and { MStay } and { DWagner } and { DWhiting }} , title={{Cryptanalysis of Rijndael // proceedings of Fast Software The Encryption Algorithm AES-RFWKIDEA32-1 based on Network}} } @book{b15, , author={{ HGilbert } and { MMinier }} , title={{Rijndael // proceedings of the Third AES Candidate Conference (AES3)}} New York, USA , year={2000} 230241 } @book{b16, , author={{ PHawkes }} , title={{Di_erential-LinearWeak Key Classes of IDEA // Advances in Cryptology,Eurocrypt98, LNCS 1403, K. Nyberg}} , publisher={Springer-Verlag} , year={1998} 112126 } @book{b17, , author={{ JKelsey } and { BSchneier } and { DWagner } and { Key-Schedule Cryptanalysis Of } and { Idea } and { GostGdes } and { Triple-Des / }} , title={{Advances in Cryptology, Crypto96, LNCS 1109}} , editor={ NKoblitz } , publisher={Springer-Verlag} , year={1996} 237251 } @book{b18, , title={{Truncated Di_erentials of IDEA // Department of Electrical Engineering}} , author={{ LRKnudsen } and { VRijmen }} 97/1 , note={Technical Report} } @incollection{b19, , title={{Related-Key Rectangle Attacks on Reduced AES-192 and AES-256 // Proceedings of Fast Software Encryption 14}} , author={{ JKim } and { SHong } and { BPreneel }} , booktitle={{Lecture Notes in Computer Science}} 4593 225241 , year={2007} , publisher={Springer-Verlag} } @book{b20, , title={{On the Design and Security of Block Ciphers // Hartung-Gorre Verlag}} , author={{ XLai }} , year={1992} , address={Konstanz} } @incollection{b21, , title={{A Proposal for a New Block Encryption Standard // Advances in Cryptology}} , author={{ XLai } and { JLMassey }} , journal={{LNCS}} , editor={I.B. Damgard} 90 389404 , year={1990} , publisher={Springer-Verlag} } @incollection{b22, , author={{ XLai } and { JLMassey } and { SMurphy }} , booktitle={{Markov Ciphers and Di_erential Cryptanalysis // Advances in Cryptology, Eurocrypt91}} , editor={ DWDavies } , publisher={Springer-Verlag} , year={1991} 547 1738 } @book{b23, , author={{ JLu } and { ODunkelman } and { NKeller } and { JKim }} , title={{New Impossible Di_erential Attacks on AES}} } @incollection{b24, , title={{On the Security of the IDEA Block Cipher // Advances in Cryptology}} , author={{ WMeier }} , journal={{LNCS}} , editor={T. Helleseth} 93 371385 , year={1994} , publisher={Springer-Verlag} } @incollection{b25, , title={{SQUARE Attacks on Reduced-Round PES and IDEA Block Ciphers. 28. National Institute of Standards and Technology}} , author={{ JNakahara } and { SL MPaulo } and { Barreto } and { BPreneel } and { JVandewalle } and { YKim }} , booktitle={{29. Phan R. Ch-W. Impossible Di_erential Cryptanalysis of 7-round Advanced Encryption Standard (AES) // Information Processing Letters}} , publisher={Elsevier} , year={2001. 2004} 91 , note={Federal Information Processing Standards Pub-14 Lecture Notes in Computer Science: Authors' Instructions lication 197} } @book{b26, , title={{About networks IDEA328, IDEA324, IDEA322, IDEA321, created on the basis of network IDEA3216 // Infocommunications: Networks Technologies-Solutions}} , author={{ GNTuychiev }} , year={2014} 4550 , address={Tashkent} } @incollection{b27, , title={{To the networks RFWKIDEA3216, RFWKIDEA328, RFWKIDEA324, RFWKIDEA322 and RFWKIDEA321, based on the net-work IDEA3216}} , author={{ GTuychiev }} , journal={{International Journal on Cryptography and Information Security (IJCIS)}} 5 1 , year={March 2015} } @book{b28, , title={{About networks IDEA8-2, IDEA8-1 and RFWKIDEA8-4, RFWKIDEA8-2, RFWKIDEA8-1 developed on the basis of network IDEA8-4 // Uzbek mathematical journal, {Tashkent}} , author={{ GNTuychiev }} , year={2014} 3 } @book{b29, , title={{About networks PES8-2 and PES8-1, developed on the basis of network PES8-4 // Transactions of the international scientific conference Modern problems of applied mathematics and information technologies {Al {Khorezmiy}} , author={{ GNTuychiev }} , year={2012. 2014} II , address={Tashkent} } @book{b30, , title={{About networks RFWKPES8{4, RFWKPES8{2, RFWKPES8{1, developed on the basis of network PES8{4 // Transactions of the international scientific conference Modern problems of applied mathematics and information technologies {Al {Khorezmiy}} , author={{ GNTuychiev }} , year={2012. 2014} 2 , address={Tashkent} } @book{b31, , title={{About networks IDEA16{4, IDEA16{2, IDEA16{1, created on the basis of network IDEA16{8 // Compilation of theses and reports republican seminar Information security in the sphere communication and information. Problems and their solutions {Tashkent}} , author={{ GNTuychiev }} , year={2014} } @incollection{b32, , title={{New encryption algorithm based on network IDEA8-1 using of the transformation of the encryption algorithm AES}} , author={{ GTuychiev }} , journal={{IPASJ International Journal of Computer Science}} 3 1 , year={2015} } @incollection{b33, , title={{New encryption algorithm based on network RFWKIDEA8-1 using transformation of AES encryption algorithm}} , author={{ GTuychiev }} , journal={{International Journal of Computer Networks and Communications Security}} 3 2 , year={2015} } @book{b34, , title={{New encryption algorithm based on network PES8-1 using of the transformations of the encryption algorithm AES // International Journal of Mul-tidisciplinary in Cryptology and Information Security}} , author={{ GTuychiev }} , year={2015} 4 } @incollection{b35, , title={{New encryption algorithm based on network RFWKPES8-1 using of the transformations of the encryption algorithm AES}} , author={{ GTuychiev }} , journal={{International Journal of Multidisciplinary in Cryptology and Information Security}} 3 , year={2014} } @book{b36, , title={{New encryption algorithm based on network IDEA16-1 using of the transformation of the encryption algorithm AES // IPASJ International The Encryption Algorithm AES-RFWKIDEA32-1 based on Network}} , author={{ GTuychiev }} } @incollection{b37, , title={{Attacking Seven Rounds of Rijndael under 192-bit and 256-bit Keys // proceedings of the Third AES Candidate Conference (AES3)}} , author={{ SLucks }} , journal={{Journal of Information Technology}} 3 1 , year={2000. 2015} } @incollection{b38, , title={{New Results on Impossible Di_erential Cryptanalysis of Reduced AES // proceedings of ICISC}} , author={{ WZhang } and { WWu } and { DFeng }} , booktitle={{Lecture Notes in Computer Science}} 4817 239250 , year={2007. 2007} , publisher={Springer-Verlag} } @incollection{b39, , title={{Improved Related-Key Impossible Di_erential Attacks on Reduced-Round AES-192 // Proceedings of Selected Areas in Cryptography}} , author={{ WZhang } and { WWu } and { LZhang } and { Dengguo Feng }} , booktitle={{Computer Science: Authors' Instructions 15}} , booktitle={{Lecture Notes in Computer Science}} , publisher={Springer-Verlag} , year={2006. 2007} 4356 1527 }