M. Bellare and P. Rogaway, Optimal asymmetric encryption, Lecture Notes in Computer Science, vol.950, pp.92-111, 1994.
DOI : 10.1007/BFb0053428

G. Bertoni, J. Daemen, M. Peeters, and G. V. Assche, The Keccak reference, 2011.

J. Black, P. Rogaway, and T. Shrimpton, Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV, Lecture Notes in Computer Science, vol.2442, pp.320-335, 2002.
DOI : 10.1007/3-540-45708-9_21

A. Bogdanov, D. Khovratovich, and C. Rechberger, Biclique Cryptanalysis of the Full AES, Lecture Notes in Computer Science, vol.7073, pp.344-371, 2011.
DOI : 10.1007/978-3-642-25385-0_19

C. Boura, A. Canteaut, and C. D. Cannière, Higher-Order Differential Properties of Keccak and Luffa, LNCS, vol.6733, pp.252-269, 2011.
DOI : 10.1007/978-3-642-13858-4_15

URL : https://hal.archives-ouvertes.fr/inria-00537741

R. Canetti, O. Goldreich, and S. Halevi, The random oracle methodology, revisited, Journal of the ACM, vol.51, issue.4, pp.557-594, 2004.
DOI : 10.1145/1008731.1008734

A. Canteaut, Fast Software Encryption -19th International Workshop Revised Selected Papers, Lecture Notes in Computer Science, vol.7549, 2012.

J. Daemen and V. Rijmen, Rijndael/AES, AES Candidate Conference, pp.343-348, 2000.
DOI : 10.1007/0-387-23483-7_358

P. Derbez, P. A. Fouque, and J. Jean, Faster Chosen-Key Distinguishers on Reduced-Round AES, Lecture Notes in Computer Science, vol.7668, pp.225-243, 2012.
DOI : 10.1007/978-3-642-34931-7_14

URL : https://hal.archives-ouvertes.fr/hal-01094335

A. Duc, J. Guo, T. Peyrin, and L. Wei, Unaligned Rebound Attack: Application to Keccak, pp.402-421
DOI : 10.1007/978-3-642-34047-5_23

P. Gauravaram, L. R. Knudsen, K. Matusiewicz, F. Mendel, C. Rechberger et al., Grøstl ? a SHA-3 candidate, NIST, 2008.

H. Gilbert and T. Peyrin, Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations, pp.365-383
DOI : 10.1007/978-3-642-13858-4_21

J. Guo, T. Peyrin, and A. Poschmann, The PHOTON Family of Lightweight Hash Functions, pp.222-239
DOI : 10.1007/978-3-642-22792-9_13

J. Guo, T. Peyrin, A. Poschmann, and M. J. Robshaw, The LED Block Cipher, Lecture Notes in Computer Science, vol.6917, pp.326-341, 2011.
DOI : 10.1007/978-3-642-23951-9_22

S. Hong and T. Iwata, Revised Selected Papers, Fast Software Encryption, 17th International Workshop, FSE 2010, 2010.

J. Jean, M. Naya-plasencia, and T. Peyrin, Improved Rebound Attack on the Finalist Gr??stl, pp.110-126
DOI : 10.1007/978-3-642-34047-5_7

D. Khovratovich and I. Nikolic, Rotational Cryptanalysis of ARX, pp.333-346
DOI : 10.1007/978-3-642-13858-4_19

M. Lamberger, F. Mendel, C. Rechberger, V. Rijmen, and M. Schläffer, Rebound Distinguishers: Results on the Full Whirlpool Compression Function, Lecture Notes in Computer Science, vol.5912, pp.126-143, 2009.
DOI : 10.1007/978-3-642-10366-7_8

M. Lamberger, F. Mendel, C. Rechberger, V. Rijmen, and M. Schläffer, The Rebound Attack and Subspace Distinguishers: Application to Whirlpool, Journal of Cryptology, vol.62, issue.6, 2010.
DOI : 10.1007/s00145-013-9166-5

K. Matusiewicz, M. Naya-plasencia, I. Nikolic, Y. Sasaki, and M. Schläffer, Rebound Attack on the Full Lane Compression Function, Lecture Notes in Computer Science, vol.5912, pp.106-125, 2009.
DOI : 10.1007/978-3-642-10366-7_7

F. Mendel, T. Peyrin, C. Rechberger, and M. Schläffer, Improved Cryptanalysis of the Reduced Gr??stl Compression Function, ECHO Permutation and AES Block Cipher, Lecture Notes in Computer Science, vol.5867, pp.16-35, 2009.
DOI : 10.1007/978-3-642-05445-7_2

F. Mendel, C. Rechberger, M. Schläffer, and S. S. Thomsen, The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Gr??stl, Lecture Notes in Computer Science, vol.5665, pp.260-276, 2009.
DOI : 10.1007/978-3-642-03317-9_16

M. Naya-plasencia, How to Improve Rebound Attacks, pp.188-205
DOI : 10.1007/978-3-642-22792-9_11

I. Nikolic, L. Wang, and S. Wu, Cryptanalysis of Round-Reduced LED, In: FSE. Lecture Notes in Computer Science, 2013.

P. Rogaway, Advances in Cryptology -CRYPTO 2011 -31st Annual Cryptology Conference, Proceedings, 2011.

Y. Sasaki, Y. Li, L. Wang, K. Sakiyama, and K. Ohta, Non-full-active Super-Sbox Analysis: Applications to ECHO and Gr??stl, Lecture Notes in Computer Science, vol.6477, pp.38-55, 2010.
DOI : 10.1007/978-3-642-17373-8_3

M. Schläffer, Updated Differential Analysis of Grøstl, Grøstl website, 2011.