The Whirlpool Hashing Function, Available, vol.24, 2000. ,
New Types of Cryptanalytic Attacks Using Related Keys, Lecture Notes in Computer Science, vol.765, pp.398-409, 1993. ,
DOI : 10.1007/3-540-48285-7_34
The SHAvite-3 Hash Function, 2009. ,
A Unified Approach to Related-Key Attacks, Lecture Notes in Computer Science, vol.5086, pp.73-96, 2008. ,
DOI : 10.1007/978-3-540-71039-4_5
Differential Cryptanalysis of DES-like Cryptosystems, CRYPTO'91, 1991. ,
Related-Key Cryptanalysis of the Full AES-192 and AES-256, pp.1-18 ,
DOI : 10.1007/978-3-642-10366-7_1
Distinguisher and Related-Key Attack on the Full AES-256, Lecture Notes in Computer Science, vol.5677, pp.231-249, 2009. ,
DOI : 10.1007/978-3-642-03356-8_14
Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others, Lecture Notes in Computer Science, vol.6110, pp.322-344, 2010. ,
DOI : 10.1007/978-3-642-13190-5_17
Structural Cryptanalysis of SASAS, Journal of Cryptology, vol.23, issue.4, pp.505-518, 2010. ,
DOI : 10.1007/s00145-010-9062-1
PRESENT: An Ultra-Lightweight Block Cipher, Lecture Notes in Computer Science, vol.4727, pp.450-466, 2007. ,
DOI : 10.1007/978-3-540-74735-2_31
Automatic Search of Attacks on Round-Reduced AES and Applications, Lecture Notes in Computer Science, vol.6841, pp.169-187, 2011. ,
DOI : 10.1007/978-3-642-22792-9_10
URL : https://hal.archives-ouvertes.fr/hal-01110414
Finding SHA-1 Characteristics: General Results and Applications, Lecture Notes in Computer Science, vol.4284, pp.1-20, 2006. ,
DOI : 10.1007/11935230_1
The Design of Rijndael: AES -The Advanced Encryption Standard, 2002. ,
DOI : 10.1007/978-3-662-04722-4
Grøstl ? a SHA-3 candidate, 2011. ,
Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations, Lecture Notes in Computer Science, vol.6147, pp.365-383, 2010. ,
DOI : 10.1007/978-3-642-13858-4_21
The LED Block Cipher, Lecture Notes in Computer Science, vol.6917, pp.326-341, 2011. ,
DOI : 10.1007/978-3-642-23951-9_22
A Formal Basis for the Heuristic Determination of Minimum Cost Paths, IEEE Transactions on Systems Science and Cybernetics, vol.4, issue.2, pp.100-107, 1968. ,
DOI : 10.1109/TSSC.1968.300136
Speeding up Collision Search for Byte-Oriented Hash Functions, Lecture Notes in Computer Science, vol.5473, pp.164-181, 2009. ,
DOI : 10.1007/11426639_2
Truncated and higher order differentials, LNCS, vol.1008, pp.196-211, 1995. ,
DOI : 10.1007/3-540-60590-8_16
Known-Key Distinguishers for Some Block Ciphers, Lecture Notes in Computer Science, vol.4833, pp.315-324, 2007. ,
DOI : 10.1007/978-3-540-76900-2_19
Rebound Distinguishers: Results on the Full Whirlpool Compression Function, pp.126-143 ,
DOI : 10.1007/978-3-642-10366-7_8
On correlation between the order of S-boxes and the strength of DES, Lecture Notes in Computer Science, vol.950, pp.366-375, 1994. ,
DOI : 10.1007/BFb0053451
Advances in Cryptology -ASIACRYPT, 15th International Conference on the Theory and Application of Cryptology and Information Security Proceedings, 2009. ,
Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs, Lecture Notes in Computer Science, vol.7417, pp.68-85, 2012. ,
DOI : 10.1007/978-3-642-32009-5_5
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.220.9331
Hash functions based on block ciphers: a synthetic approach, Lecture Notes in Computer Science, vol.773, pp.368-378, 1993. ,
DOI : 10.1007/3-540-48329-2_31
How to Break MD5 and Other Hash Functions, Lecture Notes in Computer Science, vol.3494, pp.19-35, 2005. ,
DOI : 10.1007/11426639_2
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.6718