Cryptanalysis of some encryption/cipher schemes using related key attack

Cryptanalysis of some encryption/cipher schemes using related key attack. In Henry M. Walker, editor, Working group reports from ITiCSE on Innovation and technology in computer science education, ITiCSE-WGR 2004, Leeds, United Kingdom, June 28-30, 2004. pages 85-87, ACM, 2004. [doi]

@inproceedings{HayatAT04,
  title = {Cryptanalysis of some encryption/cipher schemes using related key attack},
  year = {2004},
  doi = {10.1145/1044550.1041665},
  url = {http://doi.acm.org/10.1145/1044550.1041665},
  researchr = {https://researchr.org/publication/HayatAT04},
  cites = {0},
  citedby = {0},
  pages = {85-87},
  booktitle = {Working group reports from ITiCSE on Innovation and technology in computer science education, ITiCSE-WGR 2004, Leeds, United Kingdom, June 28-30, 2004},
  editor = {Henry M. Walker},
  publisher = {ACM},
}