D. Augot and M. Finiasz, Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes Available at https, FSE. Lecture Notes in Computer Science

D. Augot and M. Finiasz, Exhaustive search for small dimension recursive MDS diffusion layers for block ciphers and hash functions, 2013 IEEE International Symposium on Information Theory, pp.1551-1555, 2013.
DOI : 10.1109/ISIT.2013.6620487

URL : https://hal.archives-ouvertes.fr/hal-00823082

R. Benadjila, J. Guo, V. Lomné, and T. Peyrin, Implementing Lightweight Block Ciphers on x86 Architectures, Selected Areas in Cryptography, pp.324-351, 2013.
DOI : 10.1007/978-3-662-43414-7_17

D. J. Bernstein and P. Schwabe, NEON Crypto, Lecture Notes in Computer Science, vol.7428, pp.320-339, 2012.
DOI : 10.1007/978-3-642-33027-8_19

J. P. Chen and C. C. Lu, A Serial-In???Serial-Out Hardware Architecture for Systematic Encoding of Hermitian Codes via Gr??bner Bases, IEEE Transactions on Communications, vol.52, issue.8, pp.1322-1332, 2004.
DOI : 10.1109/TCOMM.2004.833020

J. Daemen and V. Rijmen, The Design of Rijndael: AES ? The Advanced Encryption Standard. Information Security and Cryptography, 2002.
DOI : 10.1007/978-3-662-04722-4

I. Duursma, Weight distributions of geometric Goppa codes, Transactions of the American Mathematical Society, vol.351, issue.09, pp.3609-3639, 1999.
DOI : 10.1090/S0002-9947-99-02179-0

J. Guo, T. Peyrin, and A. Poschmann, The PHOTON Family of Lightweight Hash Functions, Lecture Notes in Computer Science, vol.6841, pp.222-239, 2011.
DOI : 10.1007/978-3-642-22792-9_13

M. Hamburg, Accelerating AES with Vector Permute Instructions, Lecture Notes in Computer Science, vol.5747, pp.18-32, 2009.
DOI : 10.1007/978-3-642-04138-9_2

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.520.9451

C. Heegard, J. Little, and K. Saints, Systematic encoding via Grobner bases for a class of algebraic-geometric Goppa codes, IEEE Transactions on Information Theory, vol.41, issue.6, pp.1752-1761, 1995.
DOI : 10.1109/18.476247

L. R. Knudsen and H. Wu, Revised Selected Papers Selected Areas in Cryptography, Selected Areas in Cryptography, 19th International Conference, 2012.

G. Leander and A. Poschmann, On the Classification of 4 Bit S-Boxes, Lecture Notes in Computer Science, vol.4547, pp.159-176, 2007.
DOI : 10.1007/978-3-540-73074-3_13

F. J. Macwilliams and N. J. Sloane, The Theory of Error-Correcting Codes. North-Holland Mathematical Library, 1978.

V. Rijmen, J. Daemen, B. Preneel, A. Bosselaers, and E. D. Win, The cipher SHARK, Lecture Notes in Computer Science, vol.1039, pp.99-111, 1996.
DOI : 10.1007/3-540-60865-6_47

M. J. Saarinen, Cryptographic Analysis of All 4 ?? 4-Bit S-Boxes, Lecture Notes in Computer Science, vol.8, issue.1, pp.118-133, 2011.
DOI : 10.1007/978-3-540-25937-4_18

M. Sajadieh, M. Dakhilalian, H. Mala, and P. Sepehrdad, Recursive Diffusion Layers for Block Ciphers and Hash Functions, Lecture Notes in Computer Science, vol.7549, pp.385-401, 2012.
DOI : 10.1007/978-3-642-34047-5_22

H. Stichtenoth, Algebraic Function Fields and Codes. 2 edn, Graduate Texts in Mathematics, vol.254, 2009.

T. Suzaki, K. Minematsu, S. Morioka, and E. Kobayashi, TWINE: A Lightweight Block Cipher for Multiple Platforms, pp.339-354

E. Tromer, D. A. Osvik, and A. Shamir, Efficient Cache Attacks on AES, and Countermeasures, Journal of Cryptology, vol.10, issue.4, pp.37-71, 2010.
DOI : 10.1007/s00145-009-9049-y

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.150.1984

J. H. Van-lint, Introduction to Coding Theory, Graduate Texts in Mathematics, vol.86, 1999.

S. Wu, M. Wang, and W. Wu, Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions, pp.355-371
DOI : 10.1007/978-3-642-35999-6_23