S. Babbage, A Space/Time Trade-Off in Exhaustive Search Attacks on Stream Ciphers, European Convention on Security and Detection, 1995.

A. Biryukov, DES-X (or DESX), Encyclopedia of Cryptography and Security, p.331, 2011.
DOI : 10.1007/978-1-4419-5906-5_570

A. Bogdanov, D. Khovratovich, and C. Rechberger, Biclique Cryptanalysis of the Full AES, Lecture Notes in Computer Science, vol.7073, pp.344-371, 2011.
DOI : 10.1007/978-3-642-25385-0_19

J. Borghoff, A. Canteaut, T. Güneysu, M. Elif-bilge-kavun, L. R. Kne?evi´kne?evi´c et al., PRINCE ??? A Low-Latency Block Cipher for Pervasive Computing Applications, ASIACRYPT. to appear, 2012.
DOI : 10.1007/978-3-642-34961-4_14

J. Daemen, L. R. Knudsen, and V. Rijmen, The block cipher Square, Lecture Notes in Computer Science, vol.1267, pp.149-165, 1997.
DOI : 10.1007/BFb0052343

J. Daemen and V. Rijmen, The Design of Rijndael: AES -The Advanced Encryption Standard, 2002.
DOI : 10.1007/978-3-662-04722-4

O. Dunkelman, N. Keller, and A. Shamir, Minimalism in Cryptography: The Even-Mansour Scheme Revisited, Lecture Notes in Computer Science, vol.7237, pp.336-354, 2012.
DOI : 10.1007/978-3-642-29011-4_21

J. Dj and . Goli´cgoli´c, Cryptanalysis of Alleged A5 Stream Cipher, Lecture Notes in Computer Science, vol.1233, pp.239-255, 1997.